IN-PERSON

Toronto CISO Executive Summit

June 25, 2024 | Westin Harbour Castle

June 25, 2024
Westin Harbour Castle

Collaborate with your peers

Get together with Toronto's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Creatively spurring diligence and communicating the importance of cyber hygiene to the organization

Outmaneuvering threats posed either by external parties or internal users of varying access

Thoughtfully leveraging AI to develop needed, business-enabling tools and processes

Toronto CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Toronto CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


June 24, 2024

June 25, 2024

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Welcome Reception

Join the Toronto CISO Governing Body for a night of outdoor food, drinks, peer networking, and summer-ready activities. This event is open to local security executives and invited guests. 

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Remarkable Resilience - Tools for Combating Toxic Stress & Burnout

Sheila Hamilton headshot

Sheila Hamilton

Mental Health Thought Leader and Author of "All the Things We Never Knew"

Guest Speaker

Today’s CIOs & CISOs face daunting challenges. As the business leader in charge of adding value to the company, finding the right talent and inspiring technology innovation, there’s an incredible amount of pressure. It’s no surprise that CIOs & CISOs are experiencing burnout at unprecedented rates. While taking care of employees is important, how can CIOs & CISOs make sure they are taking care of themselves to help make their careers sustainable while maintaining a sense of well-being?

Join this keynote to explore:

  • Evidence-based strategies that can help alleviate burnout
  • How to recognize the signs and symptoms of toxic stress and burnout
  • How to remain engaged, energized, and focused during turbulent times

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Endpoint, Cloud and the Board — Identifying Risk that Matters

Corey Smith headshot

Corey Smith

Vice President of Solution Architects

Qualys

Tahmeed Khan headshot

Tahmeed Khan

Director, Global Information Security

Celestica

Prioritizing and eliminating the cyber risks that matter most is the ultimate goal of security leaders. But how do you validate that your efforts are hitting the mark? It all comes down to well-crafted measurements: metrics that are reliable and easily understood by all stakeholders across the business.

In this session, we will discuss:

  • Cybersecurity risk assessment essentials and which risks truly carry weight
  • Concrete approaches to determine effectiveness of security capabilities
  • Creating simple "metric cards" to communicate across stakeholders


9:40am - 10:25am  Breakout Session

30-60-90s for the Newly Hired or Nearly Retired

Bill Dunnion headshot

Bill Dunnion

CISO & VP Information Security

Mitel

Michael Dundas headshot

Michael Dundas

AVP, Information Security and Risk

IGM Financial

The importance of a 30, 60, or 90-day plan is a message largely reserved for incoming executives. There's a lot to say, however, for their benefit to more comfortable, veteran CISOs.

Join this interactive conversation to consider:

  • How writing a 30, 60, or 90-day plan could impact your program, new or established
  • Ways to ensure your plan isn't just effective, but excellent
  • When and how to check your plans in-practice effectiveness

9:40am - 10:25am  Executive Boardroom

The Business of Security — Bridging the Gap Between Cyber Initiatives and Business Impact

Qais Sattar headshot

Qais Sattar

Principal Solutions Architect

Expel

Daniel Zaman headshot

Daniel Zaman

Director, Cyber Security, Operations and Infrastructure

Holt Renfrew

Gennady Duchovich headshot

Gennady Duchovich

Head of Cybersecurity

Haventree Bank

Economic trends have tightened purse strings everywhere, leaving CISOs and security leaders to demonstrate ROI and defend their budgets. But ROI is notoriously tough to quantify when the primary return for security investment is reduction in risk. As a result, bridging the gap between security investments and actual business impact can be easier said than done, particularly if your cybersecurity spend doesn’t clearly map to organizational goals.

Join this session to discuss:

  • Identifying the right metrics for quantifying security ROI and business impact        
  • Positioning security as a business enabler, rather than a cost center
  • Aligning security investments to organizational goals

9:40am - 10:25am  Executive Boardroom

Threat Intelligence and Third-Party Risk ― Doubling Down on Critical Vulnerabilities

Peter Ling headshot

Peter Ling

VP, Global Cybersecurity Partnerships & Cyber Resilience Programs

RiskRecon - A MasterCard Company

Craig Peppard headshot

Craig Peppard

VP & CISO

ivari

Grace Kennedy headshot

Grace Kennedy

VP, IT, Risk and Governance, CISO

Empire Life Insurance

The complete entanglement of cyber risk with business risk is becoming increasingly more visible. CISOs now have an opportunity to better pinpoint third parties that present a threat to the organization. Yet the increasing complexities of third party, and even fourth party, risk management, prompted by a wide range of evolving threats, demands heightened attention. How can CISOs ensure they have a clear overview of the threat landscape and vulnerabilities across ecosystems and supply chains?

Join this session to discuss:

  • Identification of vulnerabilities across your vendor landscape to prioritize response efforts
  • Best practices for mitigating a new wave of sophisticated attacks to keep assets safe
  • The role threat intelligence plays in risk management strategies to safeguard your digital ecosystem

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

The Art of Data Security — Protecting Your Most Important Asset

Tamar Bar-Ilan headshot

Tamar Bar-Ilan

Co-Founder & CTO

Cyera

Mike Melo headshot

Mike Melo

VP Technology Shared Services & CISO

LifeLabs

As a security leader you’re being asked to find ways to securely enable your business to use data to drive innovation - and become a data master. But this takes a fundamental understanding of what data exists within your environment, where it's running, its risk level, who has access to it, and how it's being used. This interactive discussion will cover the challenges and solutions CISOs use to discover their data attack surface, monitor, detect and respond to data threats - including the scope of breach identification - and ensure data compliance.

Join this session to discuss:

  • Gaining data visibility as a foundation for data governance
  • Managing the evolving landscape of laws, regulations, and industry standards around data security
  • Working with the right tools and teams across a shared responsibility model to ensure compliance

11:05am - 11:50am  Breakout Session

CISO Priority Workshop & Industry Small Groups

Puroo Maheshwari headshot

Puroo Maheshwari

CISO, Portfolio Value Creation

CPP Investments

As the spotlight on security grows, so does the pressure to understand your organization’s unique security demands. Split into groups by industry, Toronto security executives will have a chance to hash out their goals and challenges with a select few who truly get it.

Join this interactive session to:

  • Engage with your most similar CISO peers
  • Validate strategies and uncover new ways of thinking
  • Gather proven, industry-specific, practices

11:05am - 11:50am  Executive Boardroom

Generative AI – Should CISOs be Guardians or Gatekeepers?

Lior Yaari headshot

Lior Yaari

CEO and Co-Founder

Grip Security

Mick Leach headshot

Mick Leach

Field CISO

Abnormal Security

Tom Bornais headshot

Tom Bornais

CISO

NAV CANADA

Edmond Georges headshot

Edmond Georges

CISO

Canadian Forces Base

From content generation to data analysis, generative AI is transforming the way people work and drastically improving productivity. However, the benefits do not come without risks, and the technology has the potential to do more harm than good when placed in the wrong hands. So what do security leaders need to know about the risks of generative AI, and how do they mitigate them?

Join this session for an insightful discussion on the latest cybersecurity challenges associated with generative AI, including:

  • How the threat landscape is changing as a result of generative AI
  • How businesses can ensure the privacy and security of sensitive data used in generative AI applications and govern them appropriately
  • What tools and capabilities are necessary to protect organizations from malicious uses of generative AI

11:05am - 11:50am  Executive Boardroom

Step by Step – Progress From the First Line of Defense

Chris Niggel headshot

Chris Niggel

Regional Chief Security Officer, Americas

Okta

Scott Corneil headshot

Scott Corneil

Senior Director, IT Security & Compliance

ABC Technologies

Jeff Stark headshot

Jeff Stark

CISO

Fasken

These days, it doesn’t take much to breach a system. Most attackers just need the right login info. From allowing sloppy password hygiene to poorly distributing access privileges – there are plenty of missteps threat actors are ready to exploit.

In this peer-led, roundtable discussion, you’ll consider:

  • The strengths and weaknesses of your existing defenses
  • What security cornerstones your peers are building upon
  • How to gain leverage put a stop to breaches

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Worth the Business Risk? Security That Advances Innovation

Sanjit Ganguli headshot

Sanjit Ganguli

CTO in Residence

Zscaler

IT and security must strike an intricate balance between enablement and protection. Cyber and business risk considerations should mesh into a strategy that both propels innovation and creates business value. As CISOs grapple with increasingly complex decisions and evolving digital transformation roadmaps, how can leaders position cybersecurity as a pillar for advancing innovation?

Join this session to learn:

  • How to foster inclusive conversations on cybersecurity by framing issues in terms of business risk
  • Identifying initial steps and key phases of zero trust implementation within a broader risk strategy
  • Demystifying zero trust architecture for other leaders and recruit business champions for transformation

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

The Resilient CISO - Benchmarking Your Well-being

Sheila Hamilton headshot

Sheila Hamilton

Mental Health Thought Leader and Author of "All the Things We Never Knew"

Guest Speaker

In the ever-challenging world of cybersecurity, CISOs are in a state of stress and hypervigilance.  But your humanity matters now more than ever. Now is the time to explore new strategies to maintain your well-being so you can so you can remain a resilient leader.

Join this interactive benchmarking session to dive deeper into:

  • How stress is really impacting your life
  • Your body/mind maintenance
  • Small everyday habits that can make a big difference

1:35pm - 2:20pm  Breakout Session

A Table Top For Readiness and Respect

Paul Min headshot

Paul Min

VP, Technology Operations and Security

Cadillac Fairview

Drilling those outside the security function is a time-honored proactivity practice but, as it turns out, there’s more to be gathered there than interdepartmental threat readiness. Some have found these fabricated incidents the perfect backdrop to rehearse your C-Suite influence.

Gather and hear how CISOs:

  • Are translating table top reactions into leadership feedback
  • Have identified in-need executive relationships via threat simulation
  • Are making remediation plans that address security and culture needs

1:35pm - 2:20pm  Executive Boardroom

Governing Generative AI in your Organization

Anthony Scarfe headshot

Anthony Scarfe

Deputy CISO

Elastic

Abdul Karim headshot

Abdul Karim

Director IT Security & CISO

Unity Health Toronto

Generative AI is being utilized by companies and employees alike–sometimes without permission. The normalization of this emerging technology has expanded the attack surface and left many security leaders feeling anxious and uncertain. Is generative AI worth the risk, and how should it be governed in an organization?

Join Elastic’s Deputy CISO, Anthony Scarfe, to explore:

  • What to expect from the threat landscape as generative AI becomes increasingly normalized
  • What adopting generative AI does to your attack surface, and if you should even allow it
  • How to implement governance rules that your organization will follow

1:35pm - 2:20pm  Executive Boardroom

Navigating Cybersecurity’s New Frontiers – Strategies for Resilience and Risk Mitigation

Peter Smetny headshot

Peter Smetny

Regional Vice President, Systems Engineering

Fortinet

Agnelo Dias headshot

Agnelo Dias

VP, Information Security & IT Risk

IGM Financial

Brenda McCulloch headshot

Brenda McCulloch

CISO

Teranet

In 2024, CISOs face a cybersecurity landscape characterized by evolving challenges and transformative opportunities. Whether balancing the risks and rewards of innovation, investing in proactive threat prevention, automation, and AI, or adopting nimble security models that reduce attack surfaces – the right cybersecurity strategies can enhance resilience and help mitigate risks amid rapid change.

Join this session to learn:

  • Crafting cybersecurity strategies for resilience.
  • Mitigating cybersecurity risks in a shifting landscape.
  • Optimizing team talent and resources to maximize protection

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Fire Away – CIO Office Hours

Hassan el Bouhali headshot

Hassan el Bouhali

CIO

Vale Base Metals

Cecilia Carbonelli headshot

Cecilia Carbonelli

CIO

Haventree Bank

Sarah Willock headshot

Sarah Willock

VP of Technology

Coca-Cola Canada

Don’t you wish you could pop into your CIO's head, instantly understanding their approach to important topics and decisions? Now’s your chance to pursue that candid context, pose anonymous questions and watch an all-CIO panel pull back the curtain.

The questions in this session will be decided by the audience and will touch on themes like:

  • Building relationships across the C-Suite, with both stakeholders and the enterprise
  • How to pursue innovation while keeping the lights on
  • What’s next for the role of CIO and CISO

3:00pm - 3:45pm  Executive Boardroom

Reimagining SIEM for a Modern SOC

Zlatko Saric headshot

Zlatko Saric

Tech Strategist, CTO Americas

CrowdStrike

Shimul Bhattacharjee headshot

Shimul Bhattacharjee

Global Information Security Officer, Infrastructure & Operation

Holcim

Patrick Gilbert headshot

Patrick Gilbert

Senior Director, CISO

Rona

Shamnad Shaffi headshot

Shamnad Shaffi

VP, IT Security

BentallGreenOak BGO

The legacy SIEM has not met security operations needs and SOC teams are motivated to develop a remedy. Modernizing the SOC with AI and automation is one pathway for staying ahead of today’s critical security threats. By consolidating and simplifying all key data and threat intelligence in a single platform, SOCs can stop breaches faster, become more proactive, and demonstrate value.

Join this session to discuss how to:

  • Identify critical security events sooner and leverage AI to automate response and remediation
  • Consolidate siloed security tools and investments to increase SOC efficiency and optimize costs
  • Create unified visibility across all key data and threat intelligence

3:00pm - 3:45pm  Executive Boardroom

Nobody Talks About Automation Anymore

Sandra Liepkalns headshot

Sandra Liepkalns

VP, Information Security & Data Governance

Choice Properties REIT

Priya Mouli headshot

Priya Mouli

Director of Information Security

Sheridan College

With everyone fixated on the possibilities of Generative AI, it seems few are as focused as they once were on the original way of taking stuff off their team's plate - Automated security processes.

Join a room of your peers to ask:

  • Is there still a place for security automation in the modern security program
  • Are there processes it's better to automate than offload to an AI tool
  • What security objectives still require fully-manual execution

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact: 

Nick Hall at Nick.Hall@evanta.com

3:45pm - 4:10pm  Break

4:10pm - 4:45pm  Keynote

Creative, Understandable, and User-Friendly Identity Solutions

Ragulan Sinnarajah headshot

Ragulan Sinnarajah

VP, CISO

Sobeys

Davis Arora headshot

Davis Arora

Senior Director of Cyber Security

Honeywell

The right identity processes can improve your security program and user experience at the same time. Getting to that point, though, will require vision, ambition, and the support of the business.

In this discussion between identity and security leaders you'll hear:

  • How major identity projects can pay dividends for security
  • How tailored authentication processes can meet business needs
  • How security leaders and identity advocates can garner C-level support

4:45pm - 5:00pm  Closing Comments and Prize Drawing

June 24, 2024

June 25, 2024

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Westin Harbour Castle
MORE INFORMATION

A block of rooms has been reserved at the Westin Harbour Castle at a reduced conference rate. Reservations should be made online or by calling 888-627-8559. Please mention EC5 to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $469 CAD (plus tax) is June 3, 2024.

Your Community Partners


Global Thought Leader
CISO Thought Leaders
Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Nick Hall

Senior Community Program Manager

nick.hall@evanta.com