
Virtual Summit
Canada West
Virtual Cybersecurity Summit
The Canada West Virtual Cybersecurity Summit is a new way to connect with like-minded executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, summit attendees have a lot to talk about in the live, immersive virtual experience.
Date
Wed. May 12 — Thu. May 13
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners
Event Schedule
Times for this Event are in Pacific Time (PDT/PST)
The Summit will be open from 8AM to 6PM.
- Welcome
-
Broken Authentication: Fixing one of the most critical web application security risks 9:25 am
Authentication is a cornerstone capability of any application. Ensuring a user is who they say they are is crucial to maintaining data privacy and preventing fraud and data breaches. Consequently, improperly implemented authentication, known as broken authentication, is a potentially devastating application vulnerability. In fact, the Open Web Application Security Project (OWASP) lists broken authentication as the second most critical security risk to web applications.
This session will provide:
- An overview of broken authentication;
- Why it’s so dangerous;
- The types of threats that can take advantage of this vulnerability;
- How you can prevent this most critical application security risk.
Panel Participants:
-
A Modern Approach to Information Protection 9:45 am
Data Loss Prevention (DLP) solutions alone can no longer address today’s data privacy requirements. Customer PII data is the most often lost or stolen data, and more than half of these breaches involve malicious attacks. Challenges like increasing threat activity, difficulty protecting a remote workforce, and accelerating migration of data to cloud platforms make it harder to secure data and comply with privacy regulations – especially when analysts need multiple tools to investigate data leakages. So how can you better protect your company in 2021?
Join us as we discuss how you can reimagine data privacy with a modern approach to information protection. In this session, we will cover:
- Modern data security challenges
- The convergence of data and threat protection to secure data from internal and external threats
- How people-centric investigations lead to more rapid investigative outcomes
Panel Participants:
-
Subject Matter Expert Session - More Details To Come 10:20 am
Session Details Coming Soon
-
Out of the Shadows: Real-time Asset Visibility and Security for Every Connected Device 10:45 am
For many years now, enterprises have seen an explosive rise in connected devices, from traditional IT devices like servers, workstations and PCs to new and more vulnerable IoT, IoMT, and OT like building systems, medical equipment and manufacturing machines. This myriad of devices from different manufacturers, operating systems and protocols expand the attack surface. IoT, IoMT, and OT bring their own challenges as they are typically not designed with security in mind. The bad news? Security teams are still responsible for all of them. It’s time for a modern approach. In this session, Ordr’s Chief Strategy Officer Danelle Au outlines why connected device security should be on your security initiatives in 2021, and presents a framework that starts with real-time asset inventory and ends with scalable security. Learn best practices and implementation considerations for device discovery, profiling and segmentation as you start your connected device security journey.
Panel Participants:
-
Expert Panel Discussion: Identity & Access 2021 11:05 am
The 2000’s view of “perimeter” in terms of security conjures up an analogy about castles and moats… but today, the question is, where is the moat? As we turbo-charged Work From Home this year, and BYOD is just a way of life – have your Identity and Access Management practices kept-up?
Panel Participants:
- Lunch Break
- Keynote: 12:15 pm
-
Disrupting Lateral Movement by Securing Active Directory 1:10 pm
Organizations continue to build their security stacks, yet advanced threats and insiders continue to breach networks and extract valuable data. A common tactic among most of these Ransomware and Advanced Threat Actors today involves leveraging Active Directory. AD contains all of the information that an attacker needs to successfully move laterally and accomplish their mission.
In this session, Tom Atkins will explore a new method for securing Active Directory that can (for the first time) actually prevent an attacker from progressing laterally through your enterprise network. Some key highlights include:
- How Threat Actors use AD to accomplish their goals
- Why Monitoring Active Directory is not enough
- What simple tools you can deploy to dramatically improve your security posture by better securing AD
Panel Participants:
-
Moving Beyond Password to Delight & Secure Users 1:30 pm
Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.
But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.
In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.
Panel Participants:
-
Rethinking data protection in the age of ransomware 2:05 pm
With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.
Panel Participants:
-
Get beyond compliance and achieve real data security 2:25 pm
To keep pace with the database activity explosion that has accompanied recent rapid technology innovations, organizations must rethink their strategy for securing their data assets. A strategy designed to meet compliance requirements is not enough. Organizations need to develop new approaches that augment traditional agent-based monitoring to achieve real data security today and in the future.We’ll provide insight into how you can automate data collection and monitoring so you may apply more resources to identifying non-compliant behavior and orchestrating rapid responses, regardless of where your data is or the size of your data estate.
Panel Participants:
-
Expert Panel Discussion: Supply Chain / Third Party Risk 2:50 pm
Beyond SolarWinds: Supply Chain & Third Party Risk Management for 2021
Even before SolarWinds Orion Code Compromise, Supply Chain Attacks were up over 400% in 2020. As 2021 rolls on, this attack vector has received tremendous attention. Along with third-party risk in general, partner organizations and software systems with unfettered, privileged, deep access to infrastructure create “a perfect storm” threat for modern cyber executives.
In this panel, our experts will discuss these challenges in detail, as well as the multiple approaches to identify the best means of using supply chains while keeping the third party risks at a minimum.
-
Enduring from Home: COVID-19’s Impact on Business Security 3:30 pm
All of us are living in the new Work from Home normal caused by the rapid transmission and spread of COVID-19. While people everywhere have been worried about stopping the spread of COVID, malicious threats have not only continued to propagate but they have exploded in new and interesting ways. During this presentation we will review some of the more creative ways hackers have targeted business and individuals during the age of Work from Home and some ways to protect yourself from them.
Panel Participants:
- Guest Keynote: 4:00 pm
- Day One Closing Session
- Day Two
- Breakfast Briefing 9:00 am
- Welcome / Introductions
-
The Rise of Secure Access Service Edge (SASE) 9:25 am
Secure access service edge (SASE) offerings are cloud-delivered platforms that give consistent security across different applications, devices, web destinations, on-premises resources, and infrastructure. To achieve this, these platforms deliver a variety of functionality from complementary security solutions. As organizations operate in our frenetic business world, SASE becomes imperative. In this session, you will learn:
- Why organizations need SASE
- The key components of SASE offerings
- How SASE architectures impact performance
Panel Participants:
-
THE LAST LINE OF DEFENSE: DATA PROTECTION 9:45 am
With the growth of Ransomware and cybercrime, Data protection is experiencing a resurgence. Organizations are quickly having to modernize their data protection architecture and strategies to meet not only these demands but also the demand that digital transformation is placing upon them; current approaches are designed around a backup centric approach, whereas a new approach centered around restore and getting organizations back up and running as quickly as possible are critical. Join this session to learn about the latest innovations in the data protection space and how they can be implemented to provide a restore centric approach and provide a true last line of defense.
Panel Participants:
-
CyberWarfare2021 next level $#@! you need to know for today's cyber battleground 10:20 am
Nation States, Non-Nation State Actors, Hacktivists, enterprise cyber criminals, shadow government agencies, terrorist organizations, loosely affiliated groups are using this next level $#@! as we speak to conduct cyber warfare: irregular warfare and proxy attacks, disinformation and disruption campaigns, “truth decay” (RAND Corp);to manipulate and influence public opinion, foment criminal violence; infiltrate organizations to conduct fraud, scam, and harass; highjack legitimate real human accounts for impersonation; and to distribute malware. These are very interesting times we are living in and this is the new cyber battleground.
Panel Participants:
- Subject Matter Expert Session - More Details To Come 10:45 am
- Expert Panel Discussion: Women in Cyber 11:05 am
- Lunch Break
- Lunch Briefing Sponsor 11:50 am
- Keynote Speaker 12:15 pm
-
Subject Matter Expert Session - More Details To Come 1:10 pm
Session Details Coming Soon
-
Subject Matter Expert Session - More Details To Come 1:30 pm
Session Details Coming Soon
-
Subject Matter Expert Session - More Details To Come 2:05 pm
Session Details Coming Soon
-
Subject Matter Expert Session - More Details To Come 2:25 pm
Session Details Coming Soon
-
Expert Panel Discussion: Defense in Depth 2:50 pm
Defense in Depth: New Strategies for 2021
Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations defending against inventive hackers penetrating their systems in 2020?
Panel Participants:
-
Subject Matter Expert Session - More Details To Come 3:30 pm
Session Details Coming Soon
-
CISO Panel 4:00 pm
Submit your bio for consideration to participate on our CISO Panel
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
- Summit Final closing Session
Registration
Wed. May 12 — Thu. May 13
Data Connectors events are for IT professionals only. Required fields are marked with an asterisk (*).