- This event has passed.
March 29 @ 8:00 am - 5:00 pm
The Toronto Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Senior Security Advisor
Next-gen threats require next-gen protection
How do we combat yesterday’s malware and tomorrow’s emerging threats? We’d like to say it’s easy but it takes careful coordination of existing tools and new technologies. This talk will examine some of the most destructive threats and the events that caught us off guard in the past year and how technologies like anti-exploit and machine learning can not only improve detection but also stop cybercriminals in their tracks.
John Shier, Senior Security Advisor, is a 10 year veteran of Sophos and has been working in the security industry for over 20 years. He is currently working in the office of the CTO doing research into all manner of threats and security issues. John is passionate about communicating and popularizing security concepts and technologies to customers, partners, and the public at large in an entertaining, jargon-free and accessible way. He is a frequent presenter at Sophos events and security conferences around the globe including RSA, Infosec, Cebit, and Gitex. He has appeared on TV, radio, and in many online and print publications.
Director of Product Marketing
Cloud Security & Compliance, from the Inside & Out
As organizations lift and shift resources and workloads to the cloud many are quickly realizing that legacy tools and practices in managing security and compliance don’t lift and shift as easily. In this session, we will explore current industry trends, security technology trends, lessons learned, and best practices from organizations who have been there, done that and are continuing to thrive.
Mike Reinhart serves as Sumo Logic’s Director of Product Marketing for Cloud Security and brings decades of leadership experience in global technology companies focused on Cloud, SaaS, Communications and Security service offerings.His background includes defining and developing new security and technology markets, services and product offerings, from some of the world’s largest corporations to the early stage start-ups. Mike is regularly sought after to speak at security industry, compliance and technology events worldwide.
Digital Transformation: Securing a Hyperconnected World
The vast, fast-growing global network of Internet-connected devices and endpoints represents an enormous opportunity for businesses across every industry, and the next stage in the digital transformation of enterprises. But that opportunity does not come without great risk. Hospital tech. Cars and roads. Power and water grids. Airliners. Industrial equipment. Everything is being brought online. There are already tens of billions of connected devices and endpoints worldwide, and that number will only grow.
In such a hyperconnected world, cybersecurity is not just about protecting data, but also protecting people – the secure flow of information is both mission- and safety-critical. When everything is connected, everything is a target. And if even a single endpoint in a system is unprotected, nothing is secure. Securing the Enterprise of Things is a massive undertaking, and requires a completely new approach to cybersecurity. This session will present on the Enterprise of Things Maturity Model and uses what we learned from the mobility revolution to anticipate changes to technology and, importantly, what it means to businesses as they mature. How mature and secure is your transformation in the digital era?
10 File Transfer Risks and How to Avoid Them
You know what good cybersecurity practices look like; maybe you even set them up in your organization. Files are encrypted in transit, workstations and servers are protected with strong password policies, firewalls and blacklists secure the internal network from intruders, and employees are well versed in what a phishing attack looks like. Everything is going well … and then you’re hit with a critical data breach, and you’re not sure why. Hadn’t you covered all the bases?
In reality, it’s easy to miss certain exposures and vulnerabilities that endanger your files. The smallest gap in security can risk everything—and leave you with a mess. But fortunately, once you’ve identified the weak areas, they’re often simple to fix.
In this session, join GoAnywhere Solutions Consultant Rick Elliott to explore the ten file transfer perils that organizations often run into, including:
· Giving away your user IDs and passwords via FTP transfers
· Exposing data to the DMZ (Demilitarized Zone)
· Not securing your system with the right permissions
Risks and insecurities are everywhere, and sometimes they’re hard to spot. Learn how to avoid common pitfalls, then discover how you can safeguard your data with a secure file transfer solution like GoAnywhere MFT.
Regional Sales Manager, East Canada
Systems Engineer, Canada
The Top 5 Wi-Fi Security Mistakes
Attend our Wi-Fi security presentation and see how to avoid the top 5 deployment mistakes that leave managers and their networks open to compromise.
As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.
So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:
The top 5 Wi-Fi security mistakes
- Viewing exactly what’s happening on your network
- Building an authentication and encryption model that doesn’t force user workarounds
- Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
- Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models
In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.
Solution Account Director, Security
Securing Privileged Access Across the Hybrid Enterprise
How do you defend against privileged user breaches and losses?
Whether they are obtained maliciously or leveraged inappropriately by a valid user, exploited privileged user accounts are the common thread of most data breaches. And as your environment grows increasingly complex, so does the challenge of defending against ever more sophisticated—and damaging—attacks.
This session will discuss what is a privileged account, where would you find them in your organization, and best practices for managing and controlling these accounts. We will conclude with some recommendations for a privileged access management program.
Cyber Technology Manager
Autonomous Cyber Defense: AI and the Immune System Approach
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network – before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
In this session, learn:
- How new machine learning and mathematics are automating advanced cyber defense
- Why full network visibility allows you to detect and autonomously respond to threats
- How smart prioritization and visualization of threats allows for better resource allocation and lower risk
- Real-world examples of unknown threats detected by ‘immune system’ technology
Nabil Zoldjalali is a Senior Cyber Security Technology Specialist at Darktrace, based out of the company’s Toronto office. Nabil has comprehensive technological experience with Darktrace’s Enterprise Immune System, the only AI technology capable of detecting and autonomously responding to early-stage cyber-threats. He advises Darktrace’s strategic Fortune 500 customers in North America on advanced threat detection, machine learning, and automated response. Nabil graduated from McGill University with a Bachelor of Engineering in Electrical and Electronic Engineering.
Cyber Exposure – The Next Frontier
The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program. Join us for a discussion on how companies can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.
Why attackers love email and what you can do about it
Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
Senior Sales Engineer
Disaster happens; don’t be held hostage
Does Your Time to First Byte Bite?
Demystifying Mobile, Identity, and Access Management
The convergence of identity and access management (IAM) and unified endpoint management (UEM) has opened the flood gates.
With single sign-on capabilities that increase ease of use, conditional access to protect corporate data, and delegation to LOB managers for permissions and approvals, you can enable app-cessibility on any device from anywhere.
Less mundane tasks. Quicker onboarding for IT and security leaders. Join this engaging session and learn what else makes UEM & IAM better together.