
8:30 am - 9:00 am

Registration & Exhibit Browsing

ISMG’s Global Summit Series will take place across multiple continents, focusing on global security topics such as fraud and breach prevention, zero trust security, connected devices and on many key industry verticals such as finance, government, retail, energy and healthcare.
All content will be driven by our global editorial team from publications such as DataBreachtoday, BankInfoSecurity, GovInfoSecurity and HealthcareInfoSecurity, as well as our newest sites dedicated to Payments Security, Device Security and Fraud. These events will provide the opportunity to learn from industry influencers, earn CPE credits, meet with leading technology providers and be a part of the ISMG community of over 900,000 subscribers.
Live: June 22nd @ 9am ET
On Demand: June 23rd until 5pm
Registering For a Group?
Call + 1 (609)-356-1499
Interested in addressing ISMG’s global audience of cybersecurity, information security, fraud, risk and compliance professionals?
Speaker:
Jeff Dant, Managing Director, Fraud Operations & Intelligence - Enterprise Fraud Management, BMO Financial Group
Financial crime has seen some unique spikes in the past year, and banking institutions are taking extraordinary steps to coordinate their detection, prevention and response efforts - much like their fraud fusion centers. Jeff Dant, a former U.S. Secret Service agent, now plies his skills at BMO Financial Group, where he's dealing not only with financial crime ever more persistent fraudsters ... but the impacts of the COVID-19 pandemic. In this session, Dant discusses
Speakers:
Olivera Zatezalo, CSO, Huawei CanadaSunil Chand, Canada Security Leader, CGI
As businesses and societies recover from pandemic-battling postures, what strategic adjustments and controls must CISOs employ as we enter this "pandemic rebuilding period", especially when it comes to reviewing third-party agreements and managing emerging technologies? Join this exclusive panel for unique insight into:
Speaker:
Ameya Talwalkar, Co-Founder and Chief Product Officer, Cequence Security
With APIs pervasive across your organization, powering apps, and enabling digital transformation, you need to consider whether your existing infrastructure and security tools can identify security gaps before they become incidents and if they can withstand an industrialized attack. API coding errors and malicious bots are a significant cause of fraud and theft-related revenue losses, infrastructure overspending, poor customer experience, and brand damage.
In this talk, we'll explore several case studies of API attacks and techniques and discuss what's needed to protect your applications and your business from suffering damages.
Key takeaways
Speaker:
Avi Rembaum, Vice President of Security Solutions, Check Point Software Technologies
Speaker:
Yaz Alattia, Managing Director, Accenture Security Canada
Everything has changed. Organizations have quickly pivoted towards the "new norm", adopting new practices and new technology solutions to support the business. Security multi-year strategies have not caught up. This new norm introduced new security threats to an already crowded threat landscape at a time when businesses are grappling with budgetary constraints due to the pandemic.
Join Accenture Security's Canadian Lead, Yaz Alattia, as he shares techniques and methods security organizations can use to optimize investments, quickly adapt, and emerge stronger.
Speaker:
Ryan Poppa, Director of Product Management at Cisco Cloud Security
How well do you really know your environment, your security practices and policies? Do you know the tools, techniques, and procedures that cyberattackers use to exploit your vulnerabilities?
Join Cisco Umbrella cybersecurity expert Ryan Poppa exposes the inner workings of a crafty cyberattack.
In his presentation, you'll learn:
Ryan will also share key insights on how you can protect your organization against these malicious actors and improve your cybersecurity posture with immediate results.
Speaker:
Myrna Soto, Chief Security Strategist and Trust Officer, Forcepoint
When attackers have a 95% success rate, it's not a matter of if but when they are coming in the door. Why? The traditional product-centric security paradigm is contributing to the near record number of infrastructure compromises and data breaches. Today's distributed work environment requires modern cybersecurity that is proactive, risk-adaptive and delivered through a SASE approach that understands users and data no matter where they are. Join Forcepoint Chief Strategy and Trust Officer Myrna Soto to learn actionable insights for moving your company left of breach utilizing a human-centric approach to security designed for today's sophisticated threat landscape that provides a seamless path to grow your security capabilities when and where you need them.
Attendees will learn...
Speaker:
George Nastasi, Associate Partner, Security Intelligence and Operations Consulting, IBM
Speaker:
Dan Fein, Director of Email Security Products, Americas, Darktrace
Today, 94% of cyber-threats still originate in the inbox. 'Impersonation attacks' are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or 'digital fakes', that expertly mimic the writing style of trusted contacts and colleagues.
Humans can no longer distinguish real from fake on their own - businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. In an era when thousands of documents can be encrypted in minutes, 'immune system' technology takes action in seconds - stopping cyber-threats before damage is done. Find out how in this session.
Speaker:
Samer Faour, Sales Engineer, Exabeam
Outdated threat hunting procedures hold your security program back - both in the time it takes to seek out attacker behaviors, and the level of effort involved to ascertain whether the threat still persists. In this talk, Samer Faour of Exabeam will explain how to modernize and galvanize your threat hunting program with analytics and TTPs, putting you in better stead to detect attacks earlier in the chain.
Covered in this session:
Speaker:
Renee Tarun, Deputy CISO, Fortinet
With unprecedented levels of remote working, organizations have had to respond quickly and prioritize IT and security requirements in a rapidly changing environment. In these uncertain times, organizations will need to be prepared for a variety of challenges to ensure secure operations. Organizations will need to shore up their networks to prepare for the influx of applications, devices, and other technologies necessary to support and protect customers, employees, and their business. This session will help organizations understand how to pivot quickly, where to focus their attention, and be strategic in their planning for both today's and tomorrow's security challenges.
Speaker:
Sol Cates, Principal Technologist, Thales Cloud Protection & Licensing
Speaker:
Dave Lewis, Global Advisory CISO, Cisco
Speaker:
Pascal Geenens, Director, Threat Intelligence, Radware
Speaker:
Ben Smith, Principal, Sales Engineering and Field CTO, RSA
Speaker:
Martyn Crew, Director of Solutions Marketing, Gigamon
As the dust settles on the immediate impact of Covid-19, many financial services companies are turning their attention to planning for the future. Gigamon has termed this future state as The New Tomorrow and, in this virtual event, Gigamon will discuss the trends that they are seeing emerging from their customer base as key focus areas, including:
Please join Martyn Crew, Gigamon's Solutions Marketing Director, and your industry peers to discuss some of the issues and options facing the Financial Services as we step into The New Tomorrow.
Speaker:
Gord Jamieson, Senior Director of Canada Risk Services, Visa
Speakers:
Imran Ahmad, Partner - Blake, Cassels & Graydon LLPRobin Gould-Soil, Former Head of Conduct and Chief Privacy Officer, HSBCRuth Promislow, Partner, Commercial Litigation, Fraud and Cybersecurity Practice, Bennett Jones LLP, Toronto
At the start of 2020, the legal and compliance communities were focused on the enactment of CCPA and other global privacy initiatives. A worldwide pandemic later, and the focus is on strategizing for the "new normal", the evolving threat of ransomware (and how that impacts cyber insurance) and the changing privacy landscape.
Join these seasoned cybersecurity attorneys and industry analysts for an interactive discussion of legal trends and potential traps, including:
Speaker:
Mike Burr, Lead Android Enterprise Security Evangelist, Google
Google's Android is the most popular mobile operating system in the world, powering over 2.5 billion devices.
In this exclusive session, Mike Burr of Google outlines Android's multi-layered security strategy, which includes hardware and software protections, as well as utilizing the power of machine-learning that helps protect devices at the application layer.
Learn how Android has proved that open doesn't mean unsecure, with third party validation determining that the Android platform provides the most robust security features available to enterprise.
Speaker:
Rob Roj, Senior Solutions Architect, Shape Security
Speaker:
Brittany O'Shea, Global Product Strategist, Veracode
View sessions, chat with speakers and technology experts in our Interactive Exhibit & Networking Experience, and browse our Resource Center to download educational assets to review post-summit.
If you miss any live sessions, feel free to log in and view on demand at your own pace. Session recordings will be available in our virtual environment after the live agenda has ended.
ISMG Virtual Summit Attendee Guide
For more information please download our ISMG Virtual Summit Attendee Guide.
To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.
Registering For a Group?
Call + 1 (609)-356-1499 or email at events@ismg.io