- This event has passed.
September 14, 2017 @ 8:15 am - 3:00 pm
The Montreal Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Principal Consultant, Presales
Enabling Business Growth with Trusted Digital Relationships
The Application Economy is changing everything. Traditional business models are shifting, digital disrupters are gaining ground, and customers want fast, reliable secure transactions. This means that organizations need to enhance customer relationships through new digital channels.
This session will talk about how the app economy is increasing the pressure and changing the way users are interacting with and buying from your company. Every company, regardless of industry, must make the pivot to appeal to those new buying patterns and ways that customers are engaging. Your Board and your CEO are expecting these new services and applications to be delivered. Listen to examples of how the leaders in the industry have done it.
Mike Berthold has two decades of comprehensive experience in multiple facets of the Information Technology spectrum ranging from programming and solutions development to his current position as Principal Presales Consultant at CA. Mike has been providing subject-matter expertise on CA’s Security solutions for the past three years, covering solutions in the Identity Management and Governance, Privileged Access Management, Web Access Management, and Advanced Authentication spaces.
Prior to CA, Mike worked at CN Rail for 14 years. His responsibilities ranged from acting as a Senior Consultant in the Windows XP implementation project to acting as CN’s IAM Technical Team Lead. Outside of the office Mike greatly enjoys spending time with his wife and three young children. He is an avid fan of his hometown Montreal Canadiens, has a deep interest in politics, and enjoys cooking and reading in his spare time.
Disaster Happens – Don’t Be Held Hostage
Finding your organization at the center of a data heist used to be the burden of enterprise IT, but in today’s data-centric world, no business is safe. IT security incidents have nearly doubled since 2011, according to PricewaterhouseCoopers, and concern among small and midsize businesses has risen alongside this risk. Join us to learn more about Carbonite’s newest additions to their arsenal – EVault & DoubleTake. We’ll also cover best practices for backing up your data and how you can take your defenses to the next level with DRaaS.
Systems Engineer, CISSP – Canada
What CISOs fear, and why.
According to independent Industry reports, the Internet is the source of the majority of data breaches, and the Internet is also becoming the de-facto corporate WAN. Zscaler will explore the challenges resulting from these realities, and will present an architectural approach to providing achievable security for all users in the Enterprise, whether at the office, or elsewhere.
Sales Director, Canada
The Foundation for Digital Resilience – A contextual understanding of risk – AT ALL TIMES
Providing a network modeling and risk scoring platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives. RedSeals advanced analytics engine creates a functioning model of your entire as built network so you can understand and continuously monitor your whole network, accelerate response to security incidents and network vulnerabilities. Measure resilience with your RedSeal Digital Resilience Score, benchmark, and set targets to actively manage the digital resilience of your network and security posture.
National Solutions Executive
The Threat Detection Continuum
Decisions are being made to improve every organization’s security posture, but are they being linked back to a proven Best Practices Security Methodology? We will look at the intersection between the two and how basing buying decisions on a proven best practices security methodology can decrease shelf ware amongst security technologies. According to Gartner – By 2020, 40% of all security technology acquisitions will be directly influenced by MSSPs, this is up from less than 15% in 2016. As such, we will also dive into Incident Preparedness, Threat Hunting and Managed Detection & Response as this is where many organizations are focusing their efforts these days. We will provide insight into how an MSSP, like Trustwave, is influencing this market.
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Canada Country Manager
The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network – before they turn into a full-blown crisis.
Based on unsupervised machine learning and probabilistic mathematics developed by specialists from the University of Cambridge, new ‘immune system’ technologies are capable of learning the ‘self’ of an organization. By analyzing every network, device, and user, and modeling them as they go about their day-to-day activity, the Enterprise Immune System can establish a highly accurate understanding of normal behavior. It can therefore spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat.
Rules and signatures are not keeping pace with today’s rapidly evolving cyber attacks. The Enterprise Immune System represents a fundamental step-change in automated cyber defense, is relied upon by organizations around the world, and can cover up to millions of devices.
In this session, learn:
· How new machine learning and mathematics are automating advanced cyber defense
· Why 100% network visibility allows you to detect threats as they happen, or before they happen
· How smart prioritization and visualization of threats allows for better resource allocation and lower risk
· Real-world examples of unknown threats detected by ‘immune system’ technology
Explaining Bitcoins will be the easy part: Email Borne Attacks and How You Can Defend Against Them
If you rely heavily on your users to defend your organization from email-borne attacks, you probably already have felt the impact of spear-phishing, ransomware, impersonation, and other cybercrimes. If you showcase your senior employees on your website, accept resumes online, pay your vendors by wire transfer, or have employees with Linkedin accounts, you almost certainly are on the radar of cybercriminals.
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
IoT Threats, Challenges and Secured Integration
During the presentation, we will first describe the security issues around IoT. We will then look at real life attack scenarios and at the actors involved. We will end the presentation by making recommendations on how to detect and mitigate attacks coming from IoT botnets.