The document provides information about the "CI CYBER SECURITY SUMMIT WEST" event taking place on March 1, 2016 in Calgary. It will bring together senior cyber security leaders from different sectors in an interactive roundtable format to discuss critical strategies around topics such as cloud security, third party risks, and information sharing. The agenda includes sessions led by experts on examining threats to infrastructure, optimizing cyber security resources, and safeguarding the global supply chain.
Cloud Cybersecurity: Strategies for Managing Vendor Risk
CI Cyber Security Summit West: Critical Strategies for Optimizing Security
1. CI CYBER SECURITY
SUMMIT WEST
CI
March 1, 2016 | Marriott Downtown | Calgary
An Invitation-Only Interactive
Cross-Sector Event, Gathering
Senior-Level Leaders in Cyber Security
a C5 Group Company
Business Information in a Global Context
CI Connect’s interactive Cyber Security Summit West, is a premier forum that
will bring together Cyber Security leaders to engage and collaborate on the
future of Cyber Security in our new and Interactive Roundtable (IRT) format.
Learn up-to-the minute information and critical strategies your organization
needs to optimize security initiatives.
Brian Hamilton
Director, Compliance and
Special Investigations
Office of the Informa-
tion and Privacy Com-
missioner, Alberta
Ray Boisvert
Senior Associate
Hill + Knowlton Strategies
Curtis Levinson
United States Cyber
Defense Advisor to NATO
Vice President
Centre for Strategic
Cyberspace + Security
Science (CSCSS)
Paul Piotrowski
Senior PCD Security
Strategist, APAC Region,
Shell Canada
Join Subject-Matter Experts, Including:
1-877-927-7936 | CanadianInstitute.com/CybersecurityWest
COLLABORATE | ENGAGE | EMPOWER
2. 1-877-927-7936 | CanadianInstitute.com/CybersecurityWest
CYBER SECURITY
SUMMIT WEST
CI
March 1, 2016 | Marriott Downtown | Calgary
a C5 Group Company
Business Information in a Global Context
COLLABORATE | ENGAGE | EMPOWER
CI Connect’s interactive Cyber Security Summit West, supported by a host of leading
experts, promises to deliver, up-to-the-minute information and critical strategies your
organization needs to optimize security initiatives.
CI Connect events are by invitation-only and boast a unique format, ensuring that every
participant interacts with a select group of peers, subject matter experts and solution
providers through our ‘Interactive Roundtable’ (IRT) format.
Senior executives involved in cyber security in energy, utilities, government, finance, ICT,
transportation, law enforcement and the health sectors, will gather to focus on the biggest
challenges in cyber security:
• Cloud Security: As cloud storage grows in popularity at an unprecedented pace, it
has simultaneously created new cyber security risks and challenges. Examine these
risks and pinpoint the areas of concern to ensure your organization is safeguarded
against this emerging threat.
• Third Party Provider Threats: In recent news, we’ve witnessed how major
organizations’ connection to third party vendors can open backdoors for hackers
to infiltrate an enterprise’s network. How are companies developing a vendor
management plan to bolster internal security?
• Incident Response: Different breaches require different responses – identify the type
of cyber security incident response capability you need and the level of support your
specific system requires.
• Insider Threats: How are organizations taking inventory of data paths within the
organization to adjust access allowances and ensure maximum protection against
intentional or unintentional insider threats?
• BYOD: The acceptance of “bring your own device” allows for increased productivity
and decreased enterprise costs. Explore best practices that allow employees to
securely and easily access corporate data on their own device.
• Information Sharing: Recognize the growing need for information sharing initiatives
between organizations and advancing regulations to help protect Canada’s critical
infrastructure.
RESEARCHED AND DESIGNED FOR:
• CIOs
• CTOs
• CISOs
• Chief Executives
• Heads of IT/Cyber Security
• Directors of IT/Cyber Security
WHAT YOU’LL FIND IN THIS BROCHURE:
• Agenda
• Top 5 Reasons to Attend
• Interactive Roundtable (IRT) Sessions
• Speaker Bios
• Interactive Roundtable (IRT) Format Explained
• How to Apply
• Registration Fee
• Sponsorship Opportunities
Apply to be part of these critical cyber security
discussions in 2016.
3. 1-877-927-7936 | CanadianInstitute.com/CybersecurityWest
CYBER SECURITY
SUMMIT WEST
CI
March 1, 2016 | Marriott Downtown | Calgary
a C5 Group Company
Business Information in a Global Context
8:20
Opening Remarks from Chair
Curtis Levinson,
United States Cyber Defense Advisor to NATO Vice President
Centre for Strategic Cyberspace + Security Science
(CSCSS)
8:30
Examining the Latest and Next Generation
Threats Targeting Canada’s Critical
Infrastructure
Ray Boisvert
Senior Associate
Hill + Knowlton Strategies
• Separate propaganda and explore the current and
emerging threats targeting the country’s critical
infrastructure and understanding the damage they can
inflict
• Identify which sectors are most at risk and examine the
most likely attack sources
• Understand and apply lessons learned from recent
attacks on global critical infrastructure
9:00
Optimizing National Cyber Security
Resources
David Swan
Executive Vice President, Defense Intelligence Group
Centre for Strategic Cyberspace + Security Science
(CSCSS)
• Identify and explore the cyber security programs currently
available to industry, including leveraging current
government-based aid
• Compare the resources available in Canada to those in
other countries: How does Canada stack up?
• What developments need to happen to strengthen cyber
resiliency and safeguard critical infrastructure?
9:30
IRT Discussion 1 & 2
Moderated by a cyber-security expert, participate in an
informal, dynamic discussion with your counterparts
focusing on one aspect of cyber security. Garner insights
from the experiences of security leaders which can be
integrated into an actionable plan for your organization.
10:50
Networking Break
Agenda
11:10
Safeguarding the Interconnected Global
Supply Chain from Cyber Vulnerabilities
Curtis Levinson
United States Cyber Defense Advisor to NATO Vice President
Centre for Strategic Cyberspace + Security Science
(CSCSS)
• Expose and understand the multitude of cyber hazards
that threaten the digital supply chain
• Debate whether the benefits of interconnectedness
outweigh the information technology risks
• Establish a competent internal review framework for
assessing and limiting supply chain risks and ensure
security initiatives are embedded into the life cycle of the
vendor-management contract
11:40
IRT Discussion 3 & 4
Moderated by a cyber-security expert, participate in an
informal, dynamic discussion with your counterparts
focusing on one aspect of cyber security. Garner insights
from the experiences of security leaders which can be
integrated into an actionable plan for your organization.
1:00
Networking Luncheon
4. 1-877-927-7936 | CanadianInstitute.com/CybersecurityWest
CYBER SECURITY
SUMMIT WEST
CI
March 1, 2016 | Marriott Downtown | Calgary
a C5 Group Company
Business Information in a Global Context
2:00
Seamless Discipline Integration and Inter-
Departmental Collaboration
Dominic Vogel
Independent Cyber Security Contractor
• Overcome obstacles and break down silos in order to
achieve an effective organization-wide cyber defence
strategy
• Understand how effectively bridging security gaps can
increase organizational resiliency and optimize cyber
security
• Identify innovative strategies for ensuring seamless
collaboration between key departments in your
organization
2:30
IRT Discussion 5 & 6
Moderated by a cyber-security expert, participate in an
informal, dynamic discussion with your counterparts
focusing on one aspect of cyber security. Garner insights
from the experiences of security leaders which can be
integrated into an actionable plan for your organization.
4:00
CLOSING PANEL Exposing Cyber
Vulnerabilities in Industrial Control
Systems (ICS) and Implementing
Preventative Risk Management Strategies
Pierre Janse van
Rensburg
SCADA Security Specialist
ENMAX Power
Corporation
Hani Mansi
Director, Risk and Information
Security
ATCO
Paul Piotrowski
Senior PCD Security Strategist,
APAC Region
Shell Canada
• Explore recent global attacks on critical industrial control
systems and examine innovative strategies for increasing
cyber resiliency for process and control systems
• Understand the fragility and vulnerability of these systems
within the country’s critical infrastructure sectors
• Address the challenge of patch attempts on systems that
are designed to be online without disruption
4:30
Closing Remarks from Conference Chair
Conference Adjourns
1. Connect personally with Canada’s leaders in
cyber security – discuss common challenges and
engage in high-level strategic conversations with
similar peers
2. Examine the latest threats targeting Canada by
learning what to expect and how to prepare for
the next five years of cyber-attacks
3. Gain insight into effectively planning, preparing
and responding to cyber incidents in order to
minimize damage
4. Explore the newest risks associated with Cloud
Security and third-party provider vulnerabilities
5. Understand the critical components of an
effective insider threat risk management program
TOP 5 REASONS TO ATTEND:
Agenda
5. 1-877-927-7936 | CanadianInstitute.com/CybersecurityWest
CYBER SECURITY
SUMMIT WEST
CI
March 1, 2016 | Marriott Downtown | Calgary
Topic 1
Incident Response:
Reacting to Cyber Security Incidents
• Identify the type of cyber security incident response capability you require and the level of
support you need for your specific system
• Determine the ways to respond to these attacks in a fast, effective and comprehensive
manner
• Understand your organization’s “state of readiness” to respond to a cyber-security
incident
Subject Matter Expert
Brian Hamilton
Director, Compliance and Special Investigations
Office of the Information and Privacy Commissioner, Alberta
Solution Provider
Sponsorship opportunity is available for this Roundtable Discussion Topic.
Contact our Sponsorship Team if you are interested in hosting this table.
Topic 2
Cloud Security:
Practical Considerations for Maximizing Cyber Resilience on the Cloud
• Examine and understand the cyber risks associated with sharing IP assets on the cloud
with third parties
• Identify the specific types of data that can be securely stored on the cloud and pinpoint
emerging areas of concern
• Explore current industry cloud standards and verifiable security protocol
Subject Matter Expert
Contact us if you are interested in hosting this Interactive Roundtable (IRT) session.
Solution Provider
Sponsorship opportunity is available for this Roundtable Discussion Topic.
Contact our Sponsorship Team if you are interested in hosting this table.
IRTDiscussionTopics
6. 1-877-927-7936 | CanadianInstitute.com/CybersecurityWest
CYBER SECURITY
SUMMIT WEST
CI
March 1, 2016 | Marriott Downtown | Calgary
Topic 4
Third Party Provider Threats and Risk Management
• Clearly defining the issues organizations should consider in seeking to mitigate your cyber security
risk in connection with third party service providers
• Develop a vendor management plan
• Bolster your internal security
Subject Matter Expert
Contact us if you are interested in hosting this Interactive Roundtable (IRT) session.
Solution Provider
Sponsorship opportunity is available for this Roundtable Discussion Topic.
Contact our Sponsorship Team if you are interested in hosting this table.
Topic 3
Proactive and Compliant Insider Threat Mitigation
• Clearly define “Insider Threat” and understand why this type of threat is increasing in
frequency
• Take inventory of current data paths within the organization and adjust access
allowances to ensure maximum protection
• Evaluate the effectiveness of available monitoring tools and ensure compliance with legal
risks
Subject Matter Expert
Contact us if you are interested in hosting this Interactive Roundtable (IRT) session.
Solution Provider
Sponsorship opportunity is available for this Roundtable Discussion Topic.
Contact our Sponsorship Team if you are interested in hosting this table.
IRTDiscussionTopics
7. 1-877-927-7936 | CanadianInstitute.com/CybersecurityWest
CYBER SECURITY
SUMMIT WEST
CI
March 1, 2016 | Marriott Downtown | Calgary
Topic 5
BYOD:
Data Protection and Information Security Issues
• Create a BYOD business policy
• Learn which type of corporate data can be processed on personal devices
• Explore best practices to store and delete corporate data on personal devices
Subject Matter Expert
Contact us if you are interested in hosting this Interactive Roundtable (IRT) session.
Solution Provider
Sponsorship opportunity is available for this Roundtable Discussion Topic.
Contact our Sponsorship Team if you are interested in hosting this table.
Topic 6
Information Sharing as a Collaborative Approach to Safeguarding
Critical Infrastructure
• Recognize the growing need for information sharing initiatives and advancing regulations
to help protect Canada’s critical infrastructure
• Learn best practices for information sharing between organizations in the same sector, as
well as between those in different sectors to open the lines of communication
• Examine and evaluate current information sharing networks to learn challenges,
outcomes, and opportunities
Subject Matter Expert
Kathy Macdonald
Security Professional
Retired Calgary Police
Awarded Governor General’s Member of the Order of Merit of the Police Forces
(M.O.M.)
Solution Provider
Sponsorship opportunity is available for this Roundtable Discussion Topic.
Contact our Sponsorship Team if you are interested in hosting this table.
IRTDiscussionTopics
8. 1-877-927-7936 | CanadianInstitute.com/CybersecurityWest
CYBER SECURITY
SUMMIT WEST
CI
March 1, 2016 | Marriott Downtown | Calgary
Subject Matter Expert
Ray Boisvert
Senior Associate
Hill + Knowlton Strategies
As President of I-Sec Integrated Strategies, Ray Boisvert
works with a variety of client organizations to help them
gain a deeper understanding of intelligence and security
matters in a global context, and the impact on their
operating environments.
He delivers business intelligence solutions, consults
on Mergers and Acquisitions with national security
complexities, and guides resilience building, particularly in
the areas of Cyber Security and Insider Threats.
After five years with the RCMP, Ray joined the Canadian
Security Intelligence Service (CSIS) in 1984 and retired
as Assistant Director, Intelligence in 2012. During his
tenure, Ray was involved in broad facets of security
intelligence operations - from leadership of the Counter
Terrorism domain, to Operational Risk Management, Data
Exploitation programs, Human Source management,
Foreign Collection and Special Operations.
Subject Matter Expert
Brian Hamilton
Director, Compliance and Special Investigations
Office of the Information and Privacy Commissioner,
Alberta
Brian Hamilton is Director, Compliance and Special
Investigations at the Office of the Information and Privacy
Commissioner (OIPC) of Alberta. His team investigates
potential offences under Alberta’s privacy laws, reviews
privacy impact assessments and is responsible for
privacy breach response. Prior to his current appointment
Brian served as Health Information Act Director and as an
Investigator at the OIPC. In 10 years with the OIPC, he
has conducted precedent-setting investigations involving
data encryption, biometric identification, malware,
business continuity and was the lead investigator on
Alberta’s first successful privacy offence conviction.
Previously, Brian was Manager, Privacy and Security
at Alberta Health and Wellness where he led efforts
to ensure that Alberta’s heath sector met minimum
information security standards and developed a privacy
and security audit framework for the health sector.
Brian is a past Instructor with the University of Alberta’s
Information Access and Privacy Program. Before moving
to Alberta, Brian held positions in the New Brunswick
public service.
Subject Matter Expert
Pierre Janse van Rensburg
SCADA Security Specialist
ENMAX Power Corporation
Pierre Janse van Rensburg has 20+ years of broad
ranging IT experience in multiple roles and disciplines,
including college instructor, network engineer, developer,
product manager and system specialist.
He has worked in both the public and private sector
from small start-ups to large enterprises and has been
supporting utility operations for over a decade now
focusing on OT (Operational Technology) security for the
past 8 years.
Pierre is responsible for day-to-day operational security
of the SCADA network and coordinating the creation
of the CIP standards compliance program for the T&D
operations.
ParticipantBios
9. 1-877-927-7936 | CanadianInstitute.com/CybersecurityWest
CYBER SECURITY
SUMMIT WEST
CI
March 1, 2016 | Marriott Downtown | Calgary
Subject Matter Expert
Curtis Levinson
United States Cyber Defense Advisor to NATO Vice President
Centre for Strategic Cyberspace + Security Science
(CSCSS)
Dr. Curtis Levinson has over 25 years of focused advisory
experience in Cyber Security, Information Governance,
Cloud Computing, Regulatory Compliance and Continuity
of Operations. He is a highly experienced advisor, risk
assessor and technology architect specializing in all
phases of the security engineering process.
Dr. Levinson has served with distinction, two sitting
Presidents of the United States, two Chairman of the
Joint Chiefs of Staff, and the Chief Justice of the United
States. He has been selected by the United States to
serve as the US Cyber Defense Advisor to NATO.
Dr. Levinson is a frequent consultant, author and lecturer,
within the United States and internationally, on a variety of
topics related to secure technology, telecommunications,
regulatory compliance, counter-terrorism and homeland
security. He is an adjunct lecturer for many graduate
programs in cyber security and counter-terrorism and a
member of the Capitol Technology University Board of
Trustees.
Subject Matter Expert
Kathy Macdonald
Security Professional
Retired Calgary Police
Passionate and hardworking with over two decades of
experience in security and law enforcement, Kathy is an
internationally recognized voice in the area of cybercrime
prevention, online abuse, cyberbullying, identity crime
and privacy protection. Kathy currently serves on the
Board’s of ISC(2) Alberta Chapter and Common Sense
Calgary. She is also an Industry Attaché for Stop. Think.
Connect., a global messaging convention unifying the
response to cybercrime worldwide.
Kathy is a published writer, media spokesperson and
a guest speaker at hundreds of local and international
conferences. In 2009, Kathy was Invested with the
Governor General of Canada Award, Member of the
Order of Merit of the Police Forces (M.O.M.), for her
work serving the community in the area of cybercrime
awareness.
Subject Matter Expert
Hani Mansi
Director, Risk and Information Security
ATCO
Mr. Hani Mansi has focused his career on the creation,
management and optimization of Information Security
and Cyber-security Programs. In doing so, Mr. Mansi
has fulfilled the role of Chief Information Security Officer
(CISO).
Over the past twenty five years, Mr. Mansi has
participated in Operational and Enterprise Risk
Management committees and provided updates to the
Audit Committee of the Board of Directors.
Mr. Mansi’s portfolio of responsibilities includes but
is not limited to implementing and maintaining risk
management, policy creation, governance, strategy, and
compliance practices. Currently, Mr. Mansi is the Director
of Risk and Information Security for the ATCO Group of
Companies.
ParticipantBios
10. 1-877-927-7936 | CanadianInstitute.com/CybersecurityWest
CYBER SECURITY
SUMMIT WEST
CI
March 1, 2016 | Marriott Downtown | Calgary
Subject Matter Expert
David Swan
Executive Vice President, Defense Intelligence Group
Centre for Strategic Cyberspace + Security Science
(CSCSS)
David Swan is a CSCSS Executive Vice President and
leads the CSCSS Defence Intelligence Group (C/DIG)
which focuses on transnational / International threats
against nations including infrastructure and strategic
industries.
David’s working career spans a dynamic technical
background and service in the Canadian Military Reserve.
Twice employed as a Chief Technical Officer (CTO),
he experienced attempts to acquire his company’s
Intellectual Property (IP). Since 2009 he has provided
specialized computer security consulting including
cyberintelligence and geopolitical analysis.
In the Canadian military, David enjoyed success as: a
Naval Communicator, a Naval Officer (Operations) and
an Army Intelligence Officer. His assignments included
work on a number of military computer systems. David
continued to contribute to the Army at the Unit, and
Brigade levels until he retired in 2013. David’s military
career has included work with U.S. military (Coast Guard,
Navy and USMC), U.K. (Navy and Army) and NATO.
Subject Matter Expert
Dominic Vogel
Independent Cyber Security Contractor
Dominic Vogel has an established track record of forming
positive security cultures and has been intimately
involved with IT Security in organizations of all sizes. He
has a wide-range of experience having served critical
roles in numerous projects including creating security
strategy, policy development, endpoint security, and
threat management in a multitude of industries (financial
services, logistics, transportation, and government just to
name a few).
Having worked within large and globally diverse
organizations he has extensive security experience that
has been forged over the past decade as an information
security professional.
Dominic is well regarded as a skilled communicator
having been a security blogger for the renowned IT
website TechRepublic. He has performed as a keynote
speaker for Blancco Canada Security Days, Vancouver
IEEE Career Day, Delta Chamber of Commerce, NYIT
Vancouver Cyber Security Symposium, Vancouver
Enterprise Forum, and Vancouver ISACA.
ParticipantBios
Subject Matter Expert
Paul Piotrowski
Senior PCD Security Strategist, APAC Region
Shell Canada
Paul is currently a Global Process Control Domain IT
Security Technical Authority for operating assets and
capital projects at Royal Dutch Shell. He has over
15 years of IT Security experience and has travelled
extensively internationally during his career with Shell.
He holds several certifications including the GICSP
(Global Industrial Cyber Security Professional) and CISSP.
He is locally based out of the Calgary Shell office.
11. 1-877-927-7936 | CanadianInstitute.com/CybersecurityWest
CYBER SECURITY
SUMMIT WEST
CI
March 1, 2016 | Marriott Downtown | Calgary
HOW TO APPLY
CI Connect events are by invitation only.
If you are a senior executive involved in cyber security in
energy, utilities, government, finance, ICT, transportation,
law enforcement or the health sectors, please request an
application to attend this event.
To apply or to suggest a subject matter expert to host an
Interactive Roundtable Topic, contact:
Yuga Prem
Director Delegate Sales
1-877-927-0718 ext. 7373
Y.Prem@CanadianInstitute.com
You will be notified within 1-3 business days of receiving
your application if you have been accepted.
REGISTRATION FEE
The cost of registration is $995. If you have been
approved to attend, we will send you a registration email
with conference and billing information.
SPONSORSHIP OPPORTUNITIES
To suggest a solution provider to host an Interactive
Roundtable Topic, contact:
Dan Gellman
Director of Sponsorship
1-877-927-0718 ext. 7389
D.Gellman@CanadianInstitute.com
ParticipantsTopic
Subject Matter Expert
(Host)
Solutions Provider
(Host)
Interactive Roundtable
Discussions (IRT)
Topic 1
Reacting to Cyber
Security Incidents
Topic 2
Practical
Considerations for
Maximizing Cyber
Resilience on the
Cloud
Topic 3
Proactive and
Compliant Insider
Threat Mitigation
Topic 4
Information Sharing
as a Collaborative and
Dedicated Approach
to Safeguarding
Critical Infrastructure
Topic 5
BYOD: Data
Protection and
Information Security
Issues
Topic 6
Third Party Provider
Threats and Risk
Management
IRT Rotation Depicted
INTERACTIVE ROUNDTABLE (IRT)
FORMAT EXPLAINED:
• Participants are divided into designated groups
• Each group visits every table for a 40-minute discussion
• Each table is moderated by a subject expert and solution provider,
featuring a different discussion topic
• After each 40-minute discussion, each group follows the directional
arrow to the next IRT and has a new conversation on a new topic
• Keynote presentations and panels break-up the day between IRT
rotations
WHY YOU’LL LOVE THIS
FORMAT:
• Interact with leading subject-matter
experts in cyber security
• Escape ‘death’ by PowerPoint
• Participate in an intimate group setting to
stimulate high-level strategic discussions
• Learn with peers to share similar
challenges and issues