
Virtual Summit
Canada West
Virtual Cybersecurity Summit
The Canada West Virtual Cybersecurity Summit is a new way to connect with like-minded executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, summit attendees have a lot to talk about in the live, immersive virtual experience.
Date
Wed. May 12 — Thu. May 13
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners
Event Schedule
Times for this Event are in Pacific Standard Time (PST)
The Summit will be open from 8AM to 6PM.
- Welcome
-
Understanding and Combating Credential Stuffing Attacks 9:25 am
Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.
In credential stuffing attacks, threat actors use stolen credentials from one breach to take over users’ other accounts. This is effective because, according to Google, 65% of people reuse passwords across multiple accounts. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.
Join Auth0 to learn:
- How credential stuffing attacks work
- What effect they can have on your company
- Steps to detect and mitigate these attacks
Panel Participants:
-
Do’s and Don’ts for Business Email Compromise (BEC) and Email Account Compromise (EAC) 9:45 am
Email fraud leads to two main threats- one is Business Email Compromise (BEC) where attackers pretend to be you; the other one is Email Account Compromise (EAC) where attackers actually become you. BEC/EAC scams have cost the victimized businesses over $26 billion since 2016. What they have in common is that they both target people. They both rely on social engineering and are designed to solicit fraudulent wire transfers or payment. Unlike malware attacks, BEC and EAC don’t typically include detectable malicious payload. These types of threats can be hard to recognize because to the target these business requests sent by the impostors seem very routine and reasonable.
Join our session and learn about:
- What is BEC and EAC? And how do they work?
- What are the common attack tactics regarding this new form of email threats?
- Best practices to defend against BEC and EAC
Panel Participants:
- Morning Coffee Break
-
Subject Matter Expert Session - More Details To Come 10:20 am
Session Details Coming Soon
-
Moving Beyond Password to Delight & Secure Users 10:45 am
Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.
But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.
In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.
Panel Participants:
- Expert Panel Discussion #1 11:05 am
- Lunch Break
- Keynote: 12:15 pm
-
Subject Matter Expert Session - More Details To Come 1:10 pm
Session Details Coming Soon
-
Cyber Resilience: Rethinking your data protection strategy in the age of ransomware. 1:30 pm
Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!
Panel Participants:
- Afternoon Coffee Break
-
Challenges of cloud: How it makes an already difficult situation even harder 2:05 pm
Cloud adoption is accelerating dramatically and extending many new benefits to organizations, but at the same time introducing many new challenges. This is especially true at the database security level, as the Cloud introduces a long list of new concerns: New database types (Yugabyte ?), more dynamic environments, no agents allowed, multicloud/hybrid and many others. This session will focus on better understanding these challenges and highlight strategies for incorporating Cloud into your data security model while introducing new capabilities and efficiencies.
Panel Participants:
- Subject Matter Expert Session - More Details To Come 2:30 pm
-
Expert Panel Discussion #2 2:50 pm
Session Details Coming Soon
- Afternoon Break
-
The Rise of Secure Access Service Edge (SASE) 3:35 pm
Secure access service edge (SASE) offerings are cloud-delivered platforms that give consistent security across different applications, devices, web destinations, on-premises resources, and infrastructure. To achieve this, these platforms deliver a variety of functionality from complementary security solutions. As organizations operate in our frenetic business world, SASE becomes imperative. In this session, you will learn:
- Why organizations need SASE
- The key components of SASE offerings
- How SASE architectures impact performance
Panel Participants:
- Guest Keynote: 3:55 pm
- Day One Closing Session
- Day Two
- Welcome / Introductions
-
Subject Matter Expert Session - More Details To Come 9:25 am
Session Details Coming Soon
-
Subject Matter Expert Session - More Details To Come 9:45 am
Session Details Coming Soon
- Morning Coffee Break
-
Subject Matter Expert Session - More Details To Come 10:20 am
Session Details Coming Soon
-
Subject Matter Expert Session - More Details To Come 10:45 am
Session Details Coming Soon
-
Expert Panel Discussion #3 11:05 am
Session Details Coming Soon
- Lunch Break
-
Keynote: 12:15 pm
Session Details Coming Soon
-
Subject Matter Expert Session - More Details To Come 1:10 pm
Session Details Coming Soon
-
Subject Matter Expert Session - More Details To Come 1:30 pm
Session Details Coming Soon
- Afternoon Coffee Break
-
Subject Matter Expert Session - More Details To Come 2:05 pm
Session Details Coming Soon
-
Subject Matter Expert Session - More Details To Come 2:30 pm
Session Details Coming Soon
-
Expert Panel Discussion #4 2:50 pm
Session Details Coming Soon
- Afternoon Break
-
Subject Matter Expert Session - More Details To Come 3:30 pm
Session Details Coming Soon
-
CISO Panel 3:55 pm
Submit your bio for consideration to participate on our CISO Panel
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
- Summit Final closing Session
Registration
Wed. May 12 — Thu. May 13
Data Connectors events are for IT professionals only. Required fields are marked with an asterisk (*).