ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Virtual Cybersecurity Summit: Pacific Northwest

May 04-05, 2021

Register Now

WELCOME / Summit Overview

ISMG’s Global Summit Series will take place across multiple continents, focusing on global security topics such as fraud and breach prevention, zero trust security, connected devices and on many key industry verticals such as finance, government, retail, energy and healthcare.

All content will be driven by our global editorial team from publications such as DataBreachtoday, BankInfoSecurity, GovInfoSecurity and HealthcareInfoSecurity, as well as our newest sites dedicated to Payments Security, Device Security and Fraud. These events will provide the opportunity to learn from industry influencers, earn CPE credits, meet with leading technology providers and be a part of the ISMG community of over 900,000 subscribers.

Details

Free Registration

May 4th & 5th 2021

Register Now

Registering For a Group?
Call + 1 (609)-356-1499

  • Event Gallery

Olivera Zatezalo

Chief Security Officer, Huawei Technologies Canada

Imran Ahmad

Partner - Blake, Cassels & Graydon LLP

Randy Sabett

Vice Chair, Privacy & Data Protection Practice Group, Cooley LLP

Sunil Chand

Canada Security Leader, CGI

Ryan Duquette

Security, Privacy and Risk Consulting, RSM Canada

Ruth Promislow

Partner, Commercial Litigation, Fraud and Cybersecurity Practice, Bennett Jones LLP, Toronto

Gord Jamieson

Head of Visa Canada Risk Services

Michael Theis

Chief Engineer & Assistant Director for Research, National Insider Threat Center, CERT/SEI, Carnegie Mellon University

Past Speakers / Featured Past Speakers

Jeff Dant

Managing Director, Fraud Operations & Intelligence - Enterprise Fraud Management, BMO Financial Group

Olivera Zatezalo

CSO, Huawei Canada

Gord Jamieson

Senior Director of Canada Risk Services, Visa

Mike Burr

Lead Android Enterprise Security Evangelist, Google

Robin Gould-Soil

Former Head of Conduct and Chief Privacy Officer, HSBC

Ruth Promislow

Partner, Commercial Litigation, Fraud and Cybersecurity Practice, Bennett Jones LLP, Toronto

Imran Ahmad

Partner - Blake, Cassels & Graydon LLP

Sunil Chand

Canada Security Leader, CGI

Ryan Poppa

Director of Product Management at Cisco Cloud Security

Myrna Soto

Chief Security Strategist and Trust Officer, Forcepoint

George Nastasi

Associate Partner, Security Intelligence and Operations Consulting, IBM

Ben Smith

Principal, Sales Engineering and Field CTO, RSA

Dave Lewis

Global Advisory CISO, Cisco

Brittany O'Shea

Global Product Strategist, Veracode

Pascal Geenens

Director, Threat Intelligence, Radware

Avi Rembaum

Vice President of Security Solutions, Check Point Software Technologies

Sol Cates

Principal Technologist, Thales Cloud Protection & Licensing

Samer Faour

Sales Engineer, Exabeam

Rob Roj

Senior Solutions Architect, Shape Security

Yaz Alattia

Managing Director, Accenture Security Canada

Martyn Crew

Director of Solutions Marketing, Gigamon

Call for Speakers is Now Open!

Interested in addressing ISMG’s global audience of cybersecurity, information security, fraud, risk and compliance professionals?

Click here to learn more!

Schedule / Eastern Time (ET)



  • Tuesday, May 4th

  • Wednesday, May 5th

  • Hall A
  • Hall B
  • Hall C
  • Hall D
9:00 am -
9:30 am
9:00 am - 9:30 am

Registration & Exhibit Browsing

9:30 pm -
10:00 pm
9:30 pm - 10:00 pm

Financial Crime and Fraud Fusion 2021

Speaker:
Jeff Dant, Managing Director, Fraud Operations & Intelligence - Enterprise Fraud Management, BMO Financial Group

Financial crime has seen some unique spikes in the past year, and banking institutions are taking extraordinary steps to coordinate their detection, prevention and response efforts - much like their fraud fusion centers. Jeff Dant, a former U.S. Secret Service agent, now plies his skills at BMO Financial Group, where he's dealing not only with financial crime ever more persistent fraudsters ... but the impacts of the COVID-19 pandemic. In this session, Dant discusses

  • Financial crimes and a holistic response
  • The evolution of the Fusion Center concept;
  • How COVID-19 has impacted fraud schemes and how we defend against them
10:00 am -
10:30 am
10:00 am - 10:30 am

CISO Panel: Cybersecurity After COVID-19

Speakers:
Olivera Zatezalo, CSO, Huawei Canada
Sunil Chand, Canada Security Leader, CGI

As businesses and societies recover from pandemic-battling postures, what strategic adjustments and controls must CISOs employ as we enter this "pandemic rebuilding period", especially when it comes to reviewing third-party agreements and managing emerging technologies? Join this exclusive panel for unique insight into:

  • Challenges and key considerations for security teams as we enter the "pandemic rebuilding period";
  • Reviewing the supply chain;
  • How IoT devices will shape the "new normal";
  • How privacy and cybersecurity can work together in the context of IoT and 5G.
10:30 am -
11:00 am
10:30 am - 11:00 am Track A

Defending Your APIs Against Industrialized Cybercrime

Speaker:
Ameya Talwalkar, Co-Founder and Chief Product Officer, Cequence Security

With APIs pervasive across your organization, powering apps, and enabling digital transformation, you need to consider whether your existing infrastructure and security tools can identify security gaps before they become incidents and if they can withstand an industrialized attack. API coding errors and malicious bots are a significant cause of fraud and theft-related revenue losses, infrastructure overspending, poor customer experience, and brand damage.

In this talk, we'll explore several case studies of API attacks and techniques and discuss what's needed to protect your applications and your business from suffering damages.

Key takeaways

  • How attackers are evolving to bypass detection
  • How cybercriminals beat traditional approaches
  • How Machine Learning and AI can provide help detect and defend against malicious bots
  • Why an end-to-end API security strategy is imperative to making your apps less attractive to criminals
  • 10:30 am - 11:00 am Track B

    Security Transformed

    Speaker:
    Avi Rembaum, Vice President of Security Solutions, Check Point Software Technologies

    Preceding the outbreak of COVID-19 was a trend across industries to transform the traditional IT stack into a new form of computing, one that was focused on enabling agility and innovation while also delivering cost reduction. This shift sought to leverage public cloud and cloud-like development methods as well as infrastructure design. The effort to transform information technologies, like all changes, introduces new considerations, especially in the areas of cyber, information and network security. This session will highlight some of the most significant security implications of cloud transformation. The session will also suggest key security technologies and processes that government agencies and private enterprise should consider when embarking on a transformation program.
    10:30 am - 11:00 am Track C

    Maximizing Cyber Investments During Times of Uncertainty

    Speaker:
    Yaz Alattia, Managing Director, Accenture Security Canada

    Everything has changed. Organizations have quickly pivoted towards the "new norm", adopting new practices and new technology solutions to support the business. Security multi-year strategies have not caught up. This new norm introduced new security threats to an already crowded threat landscape at a time when businesses are grappling with budgetary constraints due to the pandemic.

    Join Accenture Security's Canadian Lead, Yaz Alattia, as he shares techniques and methods security organizations can use to optimize investments, quickly adapt, and emerge stronger.

    11:00 am -
    11:30 am
    11:00 am - 11:30 am Track A

    How to Think Like a Cybercriminal (so you can outsmart them)

    Speaker:
    Ryan Poppa, Director of Product Management at Cisco Cloud Security

    How well do you really know your environment, your security practices and policies? Do you know the tools, techniques, and procedures that cyberattackers use to exploit your vulnerabilities?

    Join Cisco Umbrella cybersecurity expert Ryan Poppa exposes the inner workings of a crafty cyberattack.

    In his presentation, you'll learn:

    • Why you have been targeted for attack
    • How cybercriminals penetrate environments
    • What tactics they use to pivot from system-to-system while escalating privileges along the way
    • How they are capable of easily exfiltrating sensitive data out of your organization
    • Where your biggest threats may exist

    Ryan will also share key insights on how you can protect your organization against these malicious actors and improve your cybersecurity posture with immediate results.

    11:00 am - 11:30 am Track B

    Moving Left of Breach - The Human-Centric Cyber Path Forward

    Speaker:
    Myrna Soto, Chief Security Strategist and Trust Officer, Forcepoint

    When attackers have a 95% success rate, it's not a matter of if but when they are coming in the door. Why? The traditional product-centric security paradigm is contributing to the near record number of infrastructure compromises and data breaches. Today's distributed work environment requires modern cybersecurity that is proactive, risk-adaptive and delivered through a SASE approach that understands users and data no matter where they are. Join Forcepoint Chief Strategy and Trust Officer Myrna Soto to learn actionable insights for moving your company left of breach utilizing a human-centric approach to security designed for today's sophisticated threat landscape that provides a seamless path to grow your security capabilities when and where you need them.

    Attendees will learn...

    • How understanding human behavior underpins modern cybersecurity strategies to move left of breach
    • Operational benefits driven through the power of dynamic and adaptive security capabilities
    • Value proposition in a SASE converged security platform approach that removes operational complexities and lowers TCO up to 30%
    11:00 am - 11:30 am Track C

    Smarter Threat Management with Machine Learning and Artificial Intelligence

    Speaker:
    George Nastasi, Associate Partner, Security Intelligence and Operations Consulting, IBM

    Threats continue to evolve in complexity at unprecedented rates, making it a challenge to identify legitimate threats and respond timely. Having a threat management approach is key and infused with AI and Machine Learning, we can make decisions faster, identify threats earlier, perform investigations better, and begin response much sooner. These capabilities and tools can help at each phase of the threat management lifecycle to cover a broader spectrum of the threat landscape, efficiently analyze, and ultimately make more intelligent decisions.
    11:30 am -
    11:45 am
    11:30 am - 11:45 am Track A

    Faking It - How Cyber AI can Combat Digital Fakes

    Speaker:
    Dan Fein, Director of Email Security Products, Americas, Darktrace

    Today, 94% of cyber-threats still originate in the inbox. 'Impersonation attacks' are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or 'digital fakes', that expertly mimic the writing style of trusted contacts and colleagues.

    Humans can no longer distinguish real from fake on their own - businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. In an era when thousands of documents can be encrypted in minutes, 'immune system' technology takes action in seconds - stopping cyber-threats before damage is done. Find out how in this session.

    11:30 am - 11:45 am Track B

    Unlocking Effective Threat Detection

    Speaker:
    Samer Faour, Sales Engineer, Exabeam

    Outdated threat hunting procedures hold your security program back - both in the time it takes to seek out attacker behaviors, and the level of effort involved to ascertain whether the threat still persists. In this talk, Samer Faour of Exabeam will explain how to modernize and galvanize your threat hunting program with analytics and TTPs, putting you in better stead to detect attacks earlier in the chain.

    Covered in this session:

    • Recognizing the gaps in traditional threat hunting
    • Understanding of the tactics, techniques, or procedures (TTPs) of threat hunting
    • Pairing TTPs with data analytics
    • How to find unknown anomalies
    11:30 am - 11:45 am Track C

    Tech Spotlight: Security Operations In This New Paradigm

    Speaker:
    Renee Tarun, Deputy CISO, Fortinet

    With unprecedented levels of remote working, organizations have had to respond quickly and prioritize IT and security requirements in a rapidly changing environment. In these uncertain times, organizations will need to be prepared for a variety of challenges to ensure secure operations. Organizations will need to shore up their networks to prepare for the influx of applications, devices, and other technologies necessary to support and protect customers, employees, and their business. This session will help organizations understand how to pivot quickly, where to focus their attention, and be strategic in their planning for both today's and tomorrow's security challenges.

    11:45 am -
    12:00 pm
    11:45 am - 12:00 pm

    Exhibit, Resource Center & Networking Break

    12:00 pm -
    12:30 pm
    12:00 pm - 12:30 pm Track A

    2021: The Cybersecurity Legal and Compliance Outlook

    Speakers:
    Imran Ahmad, Partner - Blake, Cassels & Graydon LLP
    Robin Gould-Soil, Former Head of Conduct and Chief Privacy Officer, HSBC
    Ruth Promislow, Partner, Commercial Litigation, Fraud and Cybersecurity Practice, Bennett Jones LLP, Toronto

    At the start of 2020, the legal and compliance communities were focused on the enactment of CCPA and other global privacy initiatives. A worldwide pandemic later, and the focus is on strategizing for the "new normal", the evolving threat of ransomware (and how that impacts cyber insurance) and the changing privacy landscape.

    Join these seasoned cybersecurity attorneys and industry analysts for an interactive discussion of legal trends and potential traps, including:

    • Strategizing for the "new normal" from governance and policy perspectives;
    • Challenges around compliance, incident response and the growing ransomware threat;
    • The changing privacy landscape in Canada and how information professionals can adapt
    12:00 pm - 12:30 pm Track B

    Redefining Mobile Security (and Why it Works)

    Speaker:
    Mike Burr, Lead Android Enterprise Security Evangelist, Google

    Google's Android is the most popular mobile operating system in the world, powering over 2.5 billion devices.

    In this exclusive session, Mike Burr of Google outlines Android's multi-layered security strategy, which includes hardware and software protections, as well as utilizing the power of machine-learning that helps protect devices at the application layer.

    Learn how Android has proved that open doesn't mean unsecure, with third party validation determining that the Android platform provides the most robust security features available to enterprise.

    12:30 pm -
    12:45 pm
    12:30 pm - 12:45 pm Track A

    The Shifting Frontline of Fraud: Coordinating across IT, Security, and Fraud Teams

    Speaker:
    Rob Roj, Senior Solutions Architect, Shape Security

    This year's wholesale shift to online channels has not gone unnoticed by cybercriminals. Today fraudsters are continually evolving their online schemes, calling upon a sophisticated suite of tools that include human-powered click farms, social engineering, and malware - all designed to defeat traditional defenses such as WAFs and CAPTCHAs. This session will dive deeper into how organizations can keep pace with this precipitate shift and adjust their security postures accordingly, to more accurately reflect the realities of an ever-evolving threat landscape. It's up to cybersecurity leaders to anticipate and proactively respond to these emerging threats and adopt a more agile approach to managing their IT infrastructure.
    12:30 pm - 12:45 pm Track B

    Understanding Open Source Risk

    Speaker:
    Brittany O'Shea, Global Product Strategist, Veracode

    The data speaks for itself. In our analysis of over 85,000 applications, more than 500,000 open source libraries were in use. This trend is clearly here to stay and only growing, but what does it mean for your organization? In this discussion, Brittany O'Shea, Global Product Strategist for Veracode, tells us what Open source is, the risks involved with some real-life examples and how you can keep your organization secure while also empowering your development teams.
    12:45 pm -
    1:30 pm
    12:45 pm - 1:30 pm

    Exhibit, Resource Center & Networking Break

    2:00 pm -
    2:30 pm
    2:00 pm - 2:30 pm

    The Impact of COVID-19 on Fraud

    Speaker:
    Gord Jamieson, Senior Director of Canada Risk Services, Visa

    Fraudsters remain active during the pandemic and have increased the volume and sophistication of social engineering attacks with a focus on COVID-19 to create the sense of urgency. In this session, hear directly from Gord Jamieson, Sr Director - Canada Risk Services - Visa Inc. on how:
    • The change in consumer behaviour has had an negative impact on Issuer's fraud detection systems;
    • Consumer demand has resulted in growth in contactless payments;
    • The pandemic could result in several years' worth of digital transformation in 2020 alone.
    2:30 pm -
    5:00 pm
    2:30 pm - 5:00 pm

    OnDemand Session Viewing Available

    View Schedule
    • Hall A
    • Hall B
    • Hall C
    • Hall D
    8:30 am -
    9:00 am
    8:30 am - 9:00 am

    Registration & Exhibit Browsing

    9:00 am -
    9:30 am
    9:00 am - 9:30 am

    Simplifying Cloud Security and Encryption in a Multi-Cloud Environment

    Speaker:
    Sol Cates, Principal Technologist, Thales Cloud Protection & Licensing

    As businesses accelerate their migration of core processes and data to the cloud, security remains a top consideration. Security concerns remain the #1 roadblock to cloud adoption. Despite that, the migration continues as organizations seek to gain the benefits of scale and flexibility. But managing the security of your cloud-based assets can be complicated and expensive. Cloud providers offer some native solutions, like encryption, but if you operate in a multi-cloud environment, as most businesses do, then you end up having to manage multiple solutions with each provider you use. Join ISMG and Thales as we discuss the challenges of managing cloud security and how utilizing non-native solutions might be a better approach to addressing security priorities like encryption.
    9:30 am -
    10:00 am
    9:30 am - 10:00 am

    Zero Trust Access: The Five Step Program

    Speaker:
    Dave Lewis, Global Advisory CISO, Cisco

    The perimeter-based security approach of the last century is no longer adequate for securing the modern enterprise. Today, organizations must secure a mobile workforce that uses a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks. The zero trust access model delivers security without cumbersome and antiquated technologies. Attend this session to learn how the zero trust access model works, how leading organizations such as Google use this approach to secure access to their critical applications and data, and how you can implement this model in your organization in five logical steps.
    10:00 am -
    10:30 am
    10:00 am - 10:30 am

    2020 Network and Application Threat Landscape

    Speaker:
    Pascal Geenens, Director, Threat Intelligence, Radware

    Lessons learned from the past will help us secure the future. As the world is migrating their applications to new hemispheres and the weight of internet is becoming dominant in their business practices, bad actors are smelling the new opportunities and new attack vectors are forming as a dark storm cloud menacing the opportunities of digitalization. Join this session to learn about the threats to your businesses, understand who are the actors behind the threats and what are the tools they have at their disposal to disrupt your business. As you moved to remote work and accelerated your digitalization journey, a clear understanding of the threats helps you to better assess the risk and find the right balance to secure your assets and resources.
    10:30 am -
    11:00 am
    10:30 am - 11:00 am

    Managing Dynamic Workforce Risk in Times of Disruption

    Speaker:
    Ben Smith, Principal, Sales Engineering and Field CTO, RSA

    You rapidly upgraded your infrastructure and systems to support the largest teleworking experiment in history. Now, people are accessing sensitive data remotely, your workforce is in transition, your cloud journey is accelerating, and your non-human workers are multiplying. How will you validate users and access for this new dynamic workforce? How will you keep workers agile, protect resources and comply with regulations? How will you neutralize insider threats associated with intentional and unintentional misuse? If you are looking for new solutions to help prepare for your Digital Risk Management journey, join Ben Smith as he explores the underlying challenges of a vibrant, changing, workforce, provides actionable steps to address current challenges and offers insights into preparing for future disruptions and growing workforce risk.
    11:00 am -
    11:30 am
    11:00 am - 11:30 am

    Financial Services and The New Tomorrow

    Speaker:
    Martyn Crew, Director of Solutions Marketing, Gigamon

    As the dust settles on the immediate impact of Covid-19, many financial services companies are turning their attention to planning for the future. Gigamon has termed this future state as The New Tomorrow and, in this virtual event, Gigamon will discuss the trends that they are seeing emerging from their customer base as key focus areas, including:

    • How network health and optimization suddenly became a survival issue
    • Digital Transformation now has a new urgency
    • What will be the security model of The New Tomorrow?

    Please join Martyn Crew, Gigamon's Solutions Marketing Director, and your industry peers to discuss some of the issues and options facing the Financial Services as we step into The New Tomorrow.

    11:30 am -
    2:00 pm
    11:30 am - 2:00 pm

    OnDemand Session Viewing Available

    View Schedule

    PAST SPONSORS / Supporting Organizations

    Accenture
    Cequence Security
    Check Point
    Cisco Systems
    Darktrace
    DUO Security
    exabeam
    Forcepoint
    Gigamon
    IBM
    Radware
    RSA
    Thales
    Transmit Security
    Veracode

    VIRTUAL SUMMIT DETAILS / what to expect at our virtual event

    View sessions, chat with speakers and technology experts in our Interactive Exhibit & Networking Experience, and browse our Resource Center to download educational assets to review post-summit.

    If you miss any live sessions, feel free to log in and view on demand at your own pace. Session recordings will be available in our virtual environment after the agenda has ended.

    ISMG Virtual Summit Attendee Guide
    For more information please download our ISMG Virtual Summit Attendee Guide.

    Meet Our Speakers

    ISMG Global Events: 2020 and Beyond

    ISMG's SVP of Editorial, VP of Global Events, and Group Director of Custom Events discuss the state of events.

    The Critical Importance of Data Integrity

    Microsoft's Diana Kelley on How to Keep Data Untampered

    Steve Katz on Cybersecurity’s State of the Union

    World's First CISO Weighs in on the Technologies and Trends Shaping 2019

    The Challenge of Fighting Identity Fraud

    IBM's Shaked Vax on Emerging Technologies to Assure Digital IDs

    A Common Sense Guide to Mitigating Insider Threats

    Randy Trzeciak of CERT Reviews the Latest Research

    Register Today

    To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.

    Register Now

    Registering For a Group?
    Call + 1 (609)-356-1499  or email at events@ismg.io

    Contact Us

    Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

    +1 (609) 356-1499
    events@ismg.io

    Join the Community

    Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

      • BankInfoSecurity
      • CUInfoSecurity
      • GovInfoSecurity
      • HealthcareInfoSecurity
      • InfoRiskToday
      • CareersInfoSecurity
      • DataBreachToday
      • CyberEd
      Home | Summits | Press Releases | Sponsorship
      © 2021 Information Security Media Group, Corp. |
      Privacy & GDPR Statement | CCPA: Do Not Sell My Personal Data