SlideShare a Scribd company logo
1 of 11
Download to read offline
CI CYBER SECURITY
SUMMIT WEST
CI
March 1, 2016 | Marriott Downtown | Calgary
An Invitation-Only Interactive
Cross-Sector Event, Gathering
Senior-Level Leaders in Cyber Security
a C5 Group Company
Business Information in a Global Context
CI Connect’s interactive Cyber Security Summit West, is a premier forum that
will bring together Cyber Security leaders to engage and collaborate on the
future of Cyber Security in our new and Interactive Roundtable (IRT) format.
Learn up-to-the minute information and critical strategies your organization
needs to optimize security initiatives.
Brian Hamilton
Director, Compliance and
Special Investigations
Office of the Informa-
tion and Privacy Com-
missioner, Alberta
Ray Boisvert
Senior Associate
Hill + Knowlton Strategies
Curtis Levinson
United States Cyber
Defense Advisor to NATO
Vice President
Centre for Strategic
Cyberspace + Security
Science (CSCSS)
Paul Piotrowski
Senior PCD Security
Strategist, APAC Region,
Shell Canada
Join Subject-Matter Experts, Including:
	 1-877-927-7936 | CanadianInstitute.com/CybersecurityWest
COLLABORATE | ENGAGE | EMPOWER
1-877-927-7936 | CanadianInstitute.com/CybersecurityWest
CYBER SECURITY
SUMMIT WEST
CI
March 1, 2016 | Marriott Downtown | Calgary
a C5 Group Company
Business Information in a Global Context
COLLABORATE | ENGAGE | EMPOWER
CI Connect’s interactive Cyber Security Summit West, supported by a host of leading
experts, promises to deliver, up-to-the-minute information and critical strategies your
organization needs to optimize security initiatives.
CI Connect events are by invitation-only and boast a unique format, ensuring that every
participant interacts with a select group of peers, subject matter experts and solution
providers through our ‘Interactive Roundtable’ (IRT) format.
Senior executives involved in cyber security in energy, utilities, government, finance, ICT,
transportation, law enforcement and the health sectors, will gather to focus on the biggest
challenges in cyber security:
•	 Cloud Security: As cloud storage grows in popularity at an unprecedented pace, it
has simultaneously created new cyber security risks and challenges. Examine these
risks and pinpoint the areas of concern to ensure your organization is safeguarded
against this emerging threat.
•	 Third Party Provider Threats: In recent news, we’ve witnessed how major
organizations’ connection to third party vendors can open backdoors for hackers
to infiltrate an enterprise’s network. How are companies developing a vendor
management plan to bolster internal security?
•	 Incident Response: Different breaches require different responses – identify the type
of cyber security incident response capability you need and the level of support your
specific system requires.
•	 Insider Threats: How are organizations taking inventory of data paths within the
organization to adjust access allowances and ensure maximum protection against
intentional or unintentional insider threats?
•	 BYOD: The acceptance of “bring your own device” allows for increased productivity
and decreased enterprise costs. Explore best practices that allow employees to
securely and easily access corporate data on their own device.
•	 Information Sharing: Recognize the growing need for information sharing initiatives
between organizations and advancing regulations to help protect Canada’s critical
infrastructure.
RESEARCHED AND DESIGNED FOR:
•	 CIOs
•	 CTOs
•	 CISOs
•	 Chief Executives
•	 Heads of IT/Cyber Security
•	 Directors of IT/Cyber Security
WHAT YOU’LL FIND IN THIS BROCHURE:
•	 Agenda
•	 Top 5 Reasons to Attend
•	 Interactive Roundtable (IRT) Sessions
•	 Speaker Bios
•	 Interactive Roundtable (IRT) Format Explained
•	 How to Apply
•	 Registration Fee
•	 Sponsorship Opportunities
Apply to be part of these critical cyber security
discussions in 2016.
1-877-927-7936 | CanadianInstitute.com/CybersecurityWest
CYBER SECURITY
SUMMIT WEST
CI
March 1, 2016 | Marriott Downtown | Calgary
a C5 Group Company
Business Information in a Global Context
8:20 	
Opening Remarks from Chair
Curtis Levinson,
United States Cyber Defense Advisor to NATO Vice President
Centre for Strategic Cyberspace + Security Science
(CSCSS)
8:30 	
Examining the Latest and Next Generation
Threats Targeting Canada’s Critical
Infrastructure
Ray Boisvert
Senior Associate
Hill + Knowlton Strategies
•	 Separate propaganda and explore the current and
emerging threats targeting the country’s critical
infrastructure and understanding the damage they can
inflict
•	 Identify which sectors are most at risk and examine the
most likely attack sources
•	 Understand and apply lessons learned from recent
attacks on global critical infrastructure
9:00 	
Optimizing National Cyber Security
Resources
David Swan
Executive Vice President, Defense Intelligence Group
Centre for Strategic Cyberspace + Security Science
(CSCSS)
•	 Identify and explore the cyber security programs currently
available to industry, including leveraging current
government-based aid
•	 Compare the resources available in Canada to those in
other countries: How does Canada stack up?
•	 What developments need to happen to strengthen cyber
resiliency and safeguard critical infrastructure?
9:30
IRT Discussion 1 & 2
Moderated by a cyber-security expert, participate in an
informal, dynamic discussion with your counterparts
focusing on one aspect of cyber security. Garner insights
from the experiences of security leaders which can be
integrated into an actionable plan for your organization.
10:50 	
Networking Break
Agenda
11:10 	
Safeguarding the Interconnected Global
Supply Chain from Cyber Vulnerabilities
Curtis Levinson
United States Cyber Defense Advisor to NATO Vice President
Centre for Strategic Cyberspace + Security Science
(CSCSS)
•	 Expose and understand the multitude of cyber hazards
that threaten the digital supply chain
•	 Debate whether the benefits of interconnectedness
outweigh the information technology risks
•	 Establish a competent internal review framework for
assessing and limiting supply chain risks and ensure
security initiatives are embedded into the life cycle of the
vendor-management contract
11:40
IRT Discussion 3 & 4
Moderated by a cyber-security expert, participate in an
informal, dynamic discussion with your counterparts
focusing on one aspect of cyber security. Garner insights
from the experiences of security leaders which can be
integrated into an actionable plan for your organization.
1:00 	
Networking Luncheon
1-877-927-7936 | CanadianInstitute.com/CybersecurityWest
CYBER SECURITY
SUMMIT WEST
CI
March 1, 2016 | Marriott Downtown | Calgary
a C5 Group Company
Business Information in a Global Context
2:00 	
Seamless Discipline Integration and Inter-
Departmental Collaboration
Dominic Vogel
Independent Cyber Security Contractor
•	 Overcome obstacles and break down silos in order to
achieve an effective organization-wide cyber defence
strategy
•	 Understand how effectively bridging security gaps can
increase organizational resiliency and optimize cyber
security
•	 Identify innovative strategies for ensuring seamless
collaboration between key departments in your
organization
2:30
IRT Discussion 5 & 6
Moderated by a cyber-security expert, participate in an
informal, dynamic discussion with your counterparts
focusing on one aspect of cyber security. Garner insights
from the experiences of security leaders which can be
integrated into an actionable plan for your organization.
4:00 	
CLOSING PANEL Exposing Cyber
Vulnerabilities in Industrial Control
Systems (ICS) and Implementing
Preventative Risk Management Strategies
Pierre Janse van
Rensburg
SCADA Security Specialist
ENMAX Power
Corporation
Hani Mansi
Director, Risk and Information
Security
ATCO
Paul Piotrowski
Senior PCD Security Strategist,
APAC Region
Shell Canada
•	 Explore recent global attacks on critical industrial control
systems and examine innovative strategies for increasing
cyber resiliency for process and control systems
•	 Understand the fragility and vulnerability of these systems
within the country’s critical infrastructure sectors
•	 Address the challenge of patch attempts on systems that
are designed to be online without disruption	
4:30 	
Closing Remarks from Conference Chair
Conference Adjourns
1.	 Connect personally with Canada’s leaders in
cyber security – discuss common challenges and
engage in high-level strategic conversations with
similar peers
2.	 Examine the latest threats targeting Canada by
learning what to expect and how to prepare for
the next five years of cyber-attacks
3.	 Gain insight into effectively planning, preparing
and responding to cyber incidents in order to
minimize damage
4.	 Explore the newest risks associated with Cloud
Security and third-party provider vulnerabilities
5.	 Understand the critical components of an
effective insider threat risk management program
TOP 5 REASONS TO ATTEND:
Agenda
1-877-927-7936 | CanadianInstitute.com/CybersecurityWest
CYBER SECURITY
SUMMIT WEST
CI
March 1, 2016 | Marriott Downtown | Calgary
Topic 1
Incident Response:
Reacting to Cyber Security Incidents
•	 Identify the type of cyber security incident response capability you require and the level of
support you need for your specific system
•	 Determine the ways to respond to these attacks in a fast, effective and comprehensive
manner
•	 Understand your organization’s “state of readiness” to respond to a cyber-security
incident
Subject Matter Expert
Brian Hamilton
Director, Compliance and Special Investigations
Office of the Information and Privacy Commissioner, Alberta
Solution Provider
Sponsorship opportunity is available for this Roundtable Discussion Topic.
Contact our Sponsorship Team if you are interested in hosting this table.
Topic 2
Cloud Security:
Practical Considerations for Maximizing Cyber Resilience on the Cloud
•	 Examine and understand the cyber risks associated with sharing IP assets on the cloud
with third parties
•	 Identify the specific types of data that can be securely stored on the cloud and pinpoint
emerging areas of concern
•	 Explore current industry cloud standards and verifiable security protocol
Subject Matter Expert
Contact us if you are interested in hosting this Interactive Roundtable (IRT) session.
Solution Provider
Sponsorship opportunity is available for this Roundtable Discussion Topic.
Contact our Sponsorship Team if you are interested in hosting this table.
IRTDiscussionTopics
1-877-927-7936 | CanadianInstitute.com/CybersecurityWest
CYBER SECURITY
SUMMIT WEST
CI
March 1, 2016 | Marriott Downtown | Calgary
Topic 4
Third Party Provider Threats and Risk Management
•	 Clearly defining the issues organizations should consider in seeking to mitigate your cyber security
risk in connection with third party service providers
•	 Develop a vendor management plan
•	 Bolster your internal security
Subject Matter Expert
Contact us if you are interested in hosting this Interactive Roundtable (IRT) session.
Solution Provider
Sponsorship opportunity is available for this Roundtable Discussion Topic.
Contact our Sponsorship Team if you are interested in hosting this table.
Topic 3
Proactive and Compliant Insider Threat Mitigation
•	 Clearly define “Insider Threat” and understand why this type of threat is increasing in
frequency
•	 Take inventory of current data paths within the organization and adjust access
allowances to ensure maximum protection
•	 Evaluate the effectiveness of available monitoring tools and ensure compliance with legal
risks
Subject Matter Expert
Contact us if you are interested in hosting this Interactive Roundtable (IRT) session.
Solution Provider
Sponsorship opportunity is available for this Roundtable Discussion Topic.
Contact our Sponsorship Team if you are interested in hosting this table.
IRTDiscussionTopics
1-877-927-7936 | CanadianInstitute.com/CybersecurityWest
CYBER SECURITY
SUMMIT WEST
CI
March 1, 2016 | Marriott Downtown | Calgary
Topic 5
BYOD:
Data Protection and Information Security Issues
•	 Create a BYOD business policy
•	 Learn which type of corporate data can be processed on personal devices
•	 Explore best practices to store and delete corporate data on personal devices
Subject Matter Expert
Contact us if you are interested in hosting this Interactive Roundtable (IRT) session.
Solution Provider
Sponsorship opportunity is available for this Roundtable Discussion Topic.
Contact our Sponsorship Team if you are interested in hosting this table.
Topic 6
Information Sharing as a Collaborative Approach to Safeguarding
Critical Infrastructure
•	 Recognize the growing need for information sharing initiatives and advancing regulations
to help protect Canada’s critical infrastructure
•	 Learn best practices for information sharing between organizations in the same sector, as
well as between those in different sectors to open the lines of communication
•	 Examine and evaluate current information sharing networks to learn challenges,
outcomes, and opportunities
Subject Matter Expert
Kathy Macdonald
Security Professional
Retired Calgary Police
Awarded Governor General’s Member of the Order of Merit of the Police Forces
(M.O.M.)
Solution Provider
Sponsorship opportunity is available for this Roundtable Discussion Topic.
Contact our Sponsorship Team if you are interested in hosting this table.
IRTDiscussionTopics
1-877-927-7936 | CanadianInstitute.com/CybersecurityWest
CYBER SECURITY
SUMMIT WEST
CI
March 1, 2016 | Marriott Downtown | Calgary
Subject Matter Expert
Ray Boisvert
Senior Associate
Hill + Knowlton Strategies
As President of I-Sec Integrated Strategies, Ray Boisvert
works with a variety of client organizations to help them
gain a deeper understanding of intelligence and security
matters in a global context, and the impact on their
operating environments.
He delivers business intelligence solutions, consults
on Mergers and Acquisitions with national security
complexities, and guides resilience building, particularly in
the areas of Cyber Security and Insider Threats.
After five years with the RCMP, Ray joined the Canadian
Security Intelligence Service (CSIS) in 1984 and retired
as Assistant Director, Intelligence in 2012. During his
tenure, Ray was involved in broad facets of security
intelligence operations - from leadership of the Counter
Terrorism domain, to Operational Risk Management, Data
Exploitation programs, Human Source management,
Foreign Collection and Special Operations.
Subject Matter Expert
Brian Hamilton
Director, Compliance and Special Investigations
Office of the Information and Privacy Commissioner,
Alberta
Brian Hamilton is Director, Compliance and Special
Investigations at the Office of the Information and Privacy
Commissioner (OIPC) of Alberta. His team investigates
potential offences under Alberta’s privacy laws, reviews
privacy impact assessments and is responsible for
privacy breach response. Prior to his current appointment
Brian served as Health Information Act Director and as an
Investigator at the OIPC. In 10 years with the OIPC, he
has conducted precedent-setting investigations involving
data encryption, biometric identification, malware,
business continuity and was the lead investigator on
Alberta’s first successful privacy offence conviction.
Previously, Brian was Manager, Privacy and Security
at Alberta Health and Wellness where he led efforts
to ensure that Alberta’s heath sector met minimum
information security standards and developed a privacy
and security audit framework for the health sector.
Brian is a past Instructor with the University of Alberta’s
Information Access and Privacy Program. Before moving
to Alberta, Brian held positions in the New Brunswick
public service.
Subject Matter Expert
Pierre Janse van Rensburg
SCADA Security Specialist
ENMAX Power Corporation
Pierre Janse van Rensburg has 20+ years of broad
ranging IT experience in multiple roles and disciplines,
including college instructor, network engineer, developer,
product manager and system specialist.
He has worked in both the public and private sector
from small start-ups to large enterprises and has been
supporting utility operations for over a decade now
focusing on OT (Operational Technology) security for the
past 8 years.
Pierre is responsible for day-to-day operational security
of the SCADA network and coordinating the creation
of the CIP standards compliance program for the T&D
operations.
ParticipantBios
1-877-927-7936 | CanadianInstitute.com/CybersecurityWest
CYBER SECURITY
SUMMIT WEST
CI
March 1, 2016 | Marriott Downtown | Calgary
Subject Matter Expert
Curtis Levinson
United States Cyber Defense Advisor to NATO Vice President
Centre for Strategic Cyberspace + Security Science
(CSCSS)
Dr. Curtis Levinson has over 25 years of focused advisory
experience in Cyber Security, Information Governance,
Cloud Computing, Regulatory Compliance and Continuity
of Operations. He is a highly experienced advisor, risk
assessor and technology architect specializing in all
phases of the security engineering process.
Dr. Levinson has served with distinction, two sitting
Presidents of the United States, two Chairman of the
Joint Chiefs of Staff, and the Chief Justice of the United
States. He has been selected by the United States to
serve as the US Cyber Defense Advisor to NATO.
Dr. Levinson is a frequent consultant, author and lecturer,
within the United States and internationally, on a variety of
topics related to secure technology, telecommunications,
regulatory compliance, counter-terrorism and homeland
security. He is an adjunct lecturer for many graduate
programs in cyber security and counter-terrorism and a
member of the Capitol Technology University Board of
Trustees.
Subject Matter Expert
Kathy Macdonald
Security Professional
Retired Calgary Police
Passionate and hardworking with over two decades of
experience in security and law enforcement, Kathy is an
internationally recognized voice in the area of cybercrime
prevention, online abuse, cyberbullying, identity crime
and privacy protection. Kathy currently serves on the
Board’s of ISC(2) Alberta Chapter and Common Sense
Calgary. She is also an Industry Attaché for Stop. Think.
Connect., a global messaging convention unifying the
response to cybercrime worldwide.
Kathy is a published writer, media spokesperson and
a guest speaker at hundreds of local and international
conferences. In 2009, Kathy was Invested with the
Governor General of Canada Award, Member of the
Order of Merit of the Police Forces (M.O.M.), for her
work serving the community in the area of cybercrime
awareness.
Subject Matter Expert
Hani Mansi
Director, Risk and Information Security
ATCO
Mr. Hani Mansi has focused his career on the creation,
management and optimization of Information Security
and Cyber-security Programs. In doing so, Mr. Mansi
has fulfilled the role of Chief Information Security Officer
(CISO).
Over the past twenty five years, Mr. Mansi has
participated in Operational and Enterprise Risk
Management committees and provided updates to the
Audit Committee of the Board of Directors.
Mr. Mansi’s portfolio of responsibilities includes but
is not limited to implementing and maintaining risk
management, policy creation, governance, strategy, and
compliance practices. Currently, Mr. Mansi is the Director
of Risk and Information Security for the ATCO Group of
Companies.
ParticipantBios
1-877-927-7936 | CanadianInstitute.com/CybersecurityWest
CYBER SECURITY
SUMMIT WEST
CI
March 1, 2016 | Marriott Downtown | Calgary
Subject Matter Expert
David Swan
Executive Vice President, Defense Intelligence Group
Centre for Strategic Cyberspace + Security Science
(CSCSS)
David Swan is a CSCSS Executive Vice President and
leads the CSCSS Defence Intelligence Group (C/DIG)
which focuses on transnational / International threats
against nations including infrastructure and strategic
industries.
David’s working career spans a dynamic technical
background and service in the Canadian Military Reserve.
Twice employed as a Chief Technical Officer (CTO),
he experienced attempts to acquire his company’s
Intellectual Property (IP). Since 2009 he has provided
specialized computer security consulting including
cyberintelligence and geopolitical analysis.
In the Canadian military, David enjoyed success as: a
Naval Communicator, a Naval Officer (Operations) and
an Army Intelligence Officer. His assignments included
work on a number of military computer systems. David
continued to contribute to the Army at the Unit, and
Brigade levels until he retired in 2013. David’s military
career has included work with U.S. military (Coast Guard,
Navy and USMC), U.K. (Navy and Army) and NATO.
Subject Matter Expert
Dominic Vogel
Independent Cyber Security Contractor
Dominic Vogel has an established track record of forming
positive security cultures and has been intimately
involved with IT Security in organizations of all sizes. He
has a wide-range of experience having served critical
roles in numerous projects including creating security
strategy, policy development, endpoint security, and
threat management in a multitude of industries (financial
services, logistics, transportation, and government just to
name a few).
Having worked within large and globally diverse
organizations he has extensive security experience that
has been forged over the past decade as an information
security professional.
Dominic is well regarded as a skilled communicator
having been a security blogger for the renowned IT
website TechRepublic. He has performed as a keynote
speaker for Blancco Canada Security Days, Vancouver
IEEE Career Day, Delta Chamber of Commerce, NYIT
Vancouver Cyber Security Symposium, Vancouver
Enterprise Forum, and Vancouver ISACA.
ParticipantBios
Subject Matter Expert
Paul Piotrowski
Senior PCD Security Strategist, APAC Region
Shell Canada
Paul is currently a Global Process Control Domain IT
Security Technical Authority for operating assets and
capital projects at Royal Dutch Shell. He has over
15 years of IT Security experience and has travelled
extensively internationally during his career with Shell.
He holds several certifications including the GICSP
(Global Industrial Cyber Security Professional) and CISSP.
He is locally based out of the Calgary Shell office.
1-877-927-7936 | CanadianInstitute.com/CybersecurityWest
CYBER SECURITY
SUMMIT WEST
CI
March 1, 2016 | Marriott Downtown | Calgary
HOW TO APPLY
CI Connect events are by invitation only.
If you are a senior executive involved in cyber security in
energy, utilities, government, finance, ICT, transportation,
law enforcement or the health sectors, please request an
application to attend this event.
To apply or to suggest a subject matter expert to host an
Interactive Roundtable Topic, contact:
Yuga Prem
Director Delegate Sales
1-877-927-0718 ext. 7373
Y.Prem@CanadianInstitute.com
You will be notified within 1-3 business days of receiving
your application if you have been accepted.
REGISTRATION FEE
The cost of registration is $995. If you have been
approved to attend, we will send you a registration email
with conference and billing information.
SPONSORSHIP OPPORTUNITIES
To suggest a solution provider to host an Interactive
Roundtable Topic, contact:
Dan Gellman
Director of Sponsorship
1-877-927-0718 ext. 7389
D.Gellman@CanadianInstitute.com
ParticipantsTopic
Subject Matter Expert
(Host)
Solutions Provider
(Host)
Interactive Roundtable
Discussions (IRT)
Topic 1
Reacting to Cyber
Security Incidents
Topic 2
Practical
Considerations for
Maximizing Cyber
Resilience on the
Cloud
Topic 3
Proactive and
Compliant Insider
Threat Mitigation
Topic 4
Information Sharing
as a Collaborative and
Dedicated Approach
to Safeguarding
Critical Infrastructure
Topic 5
BYOD: Data
Protection and
Information Security
Issues
Topic 6
Third Party Provider
Threats and Risk
Management
IRT Rotation Depicted
INTERACTIVE ROUNDTABLE (IRT)
FORMAT EXPLAINED:
•	 Participants are divided into designated groups
•	 Each group visits every table for a 40-minute discussion
•	 Each table is moderated by a subject expert and solution provider,
featuring a different discussion topic
•	 After each 40-minute discussion, each group follows the directional
arrow to the next IRT and has a new conversation on a new topic
•	 Keynote presentations and panels break-up the day between IRT
rotations
WHY YOU’LL LOVE THIS
FORMAT:
•	 Interact with leading subject-matter
experts in cyber security
•	 Escape ‘death’ by PowerPoint
•	 Participate in an intimate group setting to
stimulate high-level strategic discussions
•	 Learn with peers to share similar
challenges and issues

More Related Content

What's hot

Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response Dragos, Inc.
 
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...Cohesive Networks
 
SMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North AmericaSMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North AmericaDale Butler
 
Cyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksCyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksPhil Huggins FBCS CITP
 
Guide to high volume data sources for SIEM
Guide to high volume data sources for SIEMGuide to high volume data sources for SIEM
Guide to high volume data sources for SIEMJoseph DeFever
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019ImekDesign
 
Making Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software DevelopmentMaking Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software DevelopmentConSanFrancisco123
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceSyed Peer
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate PerspectiveDawn Yankeelov
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityPhil Agcaoili
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityPhil Agcaoili
 
Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?PECB
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research CSSaunders
 
Responding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksResponding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksIBM
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilienceAndrew Bycroft
 

What's hot (20)

Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response
 
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
 
SMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North AmericaSMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North America
 
Cyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksCyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber Shocks
 
Guide to high volume data sources for SIEM
Guide to high volume data sources for SIEMGuide to high volume data sources for SIEM
Guide to high volume data sources for SIEM
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019
 
Making Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software DevelopmentMaking Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software Development
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Collaborative Defence
Collaborative DefenceCollaborative Defence
Collaborative Defence
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber Security
 
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHSInsight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
 
Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research
 
Responding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksResponding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacks
 
Cybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future AttacksCybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future Attacks
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilience
 

Viewers also liked

Why conquering complexity is a critical component of an effective security pr...
Why conquering complexity is a critical component of an effective security pr...Why conquering complexity is a critical component of an effective security pr...
Why conquering complexity is a critical component of an effective security pr...Dominic Vogel
 
GMITCS-2016-Agenda.August
GMITCS-2016-Agenda.AugustGMITCS-2016-Agenda.August
GMITCS-2016-Agenda.AugustDominic Vogel
 
一張圖也可以很精采
一張圖也可以很精采一張圖也可以很精采
一張圖也可以很精采sliDEsign
 
Simaran Singh_Resume
Simaran Singh_ResumeSimaran Singh_Resume
Simaran Singh_ResumeSimaran singh
 
LinuxCon 2015 Keynote: Warning - May contain clouds!
LinuxCon 2015 Keynote: Warning - May contain clouds!LinuxCon 2015 Keynote: Warning - May contain clouds!
LinuxCon 2015 Keynote: Warning - May contain clouds!Duncan Johnston-Watt
 
Estructura del sistema financiero de colombia
Estructura del sistema financiero de colombiaEstructura del sistema financiero de colombia
Estructura del sistema financiero de colombiaArleth Torres
 
BCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_ProofBCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_ProofDominic Vogel
 
Hacking Security - Tech Talent Meetup (Vancouver, BC) _ Meetup
Hacking Security - Tech Talent Meetup (Vancouver, BC) _ MeetupHacking Security - Tech Talent Meetup (Vancouver, BC) _ Meetup
Hacking Security - Tech Talent Meetup (Vancouver, BC) _ MeetupDominic Vogel
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapDominic Vogel
 
Mobile Messaging solutions for financial service companies
Mobile Messaging solutions for financial service companiesMobile Messaging solutions for financial service companies
Mobile Messaging solutions for financial service companiesMDK Labs GmbH
 

Viewers also liked (13)

Why conquering complexity is a critical component of an effective security pr...
Why conquering complexity is a critical component of an effective security pr...Why conquering complexity is a critical component of an effective security pr...
Why conquering complexity is a critical component of an effective security pr...
 
GMITCS-2016-Agenda.August
GMITCS-2016-Agenda.AugustGMITCS-2016-Agenda.August
GMITCS-2016-Agenda.August
 
一張圖也可以很精采
一張圖也可以很精采一張圖也可以很精采
一張圖也可以很精采
 
Simaran Singh_Resume
Simaran Singh_ResumeSimaran Singh_Resume
Simaran Singh_Resume
 
Rajesh 1.5 year (1)
Rajesh 1.5 year (1)Rajesh 1.5 year (1)
Rajesh 1.5 year (1)
 
LinuxCon 2015 Keynote: Warning - May contain clouds!
LinuxCon 2015 Keynote: Warning - May contain clouds!LinuxCon 2015 Keynote: Warning - May contain clouds!
LinuxCon 2015 Keynote: Warning - May contain clouds!
 
Estructura del sistema financiero de colombia
Estructura del sistema financiero de colombiaEstructura del sistema financiero de colombia
Estructura del sistema financiero de colombia
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
BCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_ProofBCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_Proof
 
Hacking Security - Tech Talent Meetup (Vancouver, BC) _ Meetup
Hacking Security - Tech Talent Meetup (Vancouver, BC) _ MeetupHacking Security - Tech Talent Meetup (Vancouver, BC) _ Meetup
Hacking Security - Tech Talent Meetup (Vancouver, BC) _ Meetup
 
Tumores de cyc 3
Tumores de cyc 3Tumores de cyc 3
Tumores de cyc 3
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 
Mobile Messaging solutions for financial service companies
Mobile Messaging solutions for financial service companiesMobile Messaging solutions for financial service companies
Mobile Messaging solutions for financial service companies
 

Similar to CI Cyber Security Summit West: Critical Strategies for Optimizing Security

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Matthew Rosenquist
 
Overview of National Cybersecurity Strategy 2023.pdf
Overview of National Cybersecurity Strategy 2023.pdfOverview of National Cybersecurity Strategy 2023.pdf
Overview of National Cybersecurity Strategy 2023.pdfNiloufer Tamboly
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Manuel Guillen
 
DHS Cybersecurity Webinar
DHS Cybersecurity Webinar DHS Cybersecurity Webinar
DHS Cybersecurity Webinar businessforward
 
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦Infosec train
 
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦priyanshamadhwal2
 
Security+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdfSecurity+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdfinfosecTrain
 
CompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training CourseCompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training CourseInfosecTrain Education
 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfInfosec train
 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfpriyanshamadhwal2
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskHealth Catalyst
 

Similar to CI Cyber Security Summit West: Critical Strategies for Optimizing Security (20)

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cs cmaster
Cs cmasterCs cmaster
Cs cmaster
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
 
Overview of National Cybersecurity Strategy 2023.pdf
Overview of National Cybersecurity Strategy 2023.pdfOverview of National Cybersecurity Strategy 2023.pdf
Overview of National Cybersecurity Strategy 2023.pdf
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
DHS Cybersecurity Webinar
DHS Cybersecurity Webinar DHS Cybersecurity Webinar
DHS Cybersecurity Webinar
 
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
 
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
 
Security+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdfSecurity+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdf
 
CompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training CourseCompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training Course
 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdf
 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdf
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor Risk
 

CI Cyber Security Summit West: Critical Strategies for Optimizing Security

  • 1. CI CYBER SECURITY SUMMIT WEST CI March 1, 2016 | Marriott Downtown | Calgary An Invitation-Only Interactive Cross-Sector Event, Gathering Senior-Level Leaders in Cyber Security a C5 Group Company Business Information in a Global Context CI Connect’s interactive Cyber Security Summit West, is a premier forum that will bring together Cyber Security leaders to engage and collaborate on the future of Cyber Security in our new and Interactive Roundtable (IRT) format. Learn up-to-the minute information and critical strategies your organization needs to optimize security initiatives. Brian Hamilton Director, Compliance and Special Investigations Office of the Informa- tion and Privacy Com- missioner, Alberta Ray Boisvert Senior Associate Hill + Knowlton Strategies Curtis Levinson United States Cyber Defense Advisor to NATO Vice President Centre for Strategic Cyberspace + Security Science (CSCSS) Paul Piotrowski Senior PCD Security Strategist, APAC Region, Shell Canada Join Subject-Matter Experts, Including: 1-877-927-7936 | CanadianInstitute.com/CybersecurityWest COLLABORATE | ENGAGE | EMPOWER
  • 2. 1-877-927-7936 | CanadianInstitute.com/CybersecurityWest CYBER SECURITY SUMMIT WEST CI March 1, 2016 | Marriott Downtown | Calgary a C5 Group Company Business Information in a Global Context COLLABORATE | ENGAGE | EMPOWER CI Connect’s interactive Cyber Security Summit West, supported by a host of leading experts, promises to deliver, up-to-the-minute information and critical strategies your organization needs to optimize security initiatives. CI Connect events are by invitation-only and boast a unique format, ensuring that every participant interacts with a select group of peers, subject matter experts and solution providers through our ‘Interactive Roundtable’ (IRT) format. Senior executives involved in cyber security in energy, utilities, government, finance, ICT, transportation, law enforcement and the health sectors, will gather to focus on the biggest challenges in cyber security: • Cloud Security: As cloud storage grows in popularity at an unprecedented pace, it has simultaneously created new cyber security risks and challenges. Examine these risks and pinpoint the areas of concern to ensure your organization is safeguarded against this emerging threat. • Third Party Provider Threats: In recent news, we’ve witnessed how major organizations’ connection to third party vendors can open backdoors for hackers to infiltrate an enterprise’s network. How are companies developing a vendor management plan to bolster internal security? • Incident Response: Different breaches require different responses – identify the type of cyber security incident response capability you need and the level of support your specific system requires. • Insider Threats: How are organizations taking inventory of data paths within the organization to adjust access allowances and ensure maximum protection against intentional or unintentional insider threats? • BYOD: The acceptance of “bring your own device” allows for increased productivity and decreased enterprise costs. Explore best practices that allow employees to securely and easily access corporate data on their own device. • Information Sharing: Recognize the growing need for information sharing initiatives between organizations and advancing regulations to help protect Canada’s critical infrastructure. RESEARCHED AND DESIGNED FOR: • CIOs • CTOs • CISOs • Chief Executives • Heads of IT/Cyber Security • Directors of IT/Cyber Security WHAT YOU’LL FIND IN THIS BROCHURE: • Agenda • Top 5 Reasons to Attend • Interactive Roundtable (IRT) Sessions • Speaker Bios • Interactive Roundtable (IRT) Format Explained • How to Apply • Registration Fee • Sponsorship Opportunities Apply to be part of these critical cyber security discussions in 2016.
  • 3. 1-877-927-7936 | CanadianInstitute.com/CybersecurityWest CYBER SECURITY SUMMIT WEST CI March 1, 2016 | Marriott Downtown | Calgary a C5 Group Company Business Information in a Global Context 8:20 Opening Remarks from Chair Curtis Levinson, United States Cyber Defense Advisor to NATO Vice President Centre for Strategic Cyberspace + Security Science (CSCSS) 8:30 Examining the Latest and Next Generation Threats Targeting Canada’s Critical Infrastructure Ray Boisvert Senior Associate Hill + Knowlton Strategies • Separate propaganda and explore the current and emerging threats targeting the country’s critical infrastructure and understanding the damage they can inflict • Identify which sectors are most at risk and examine the most likely attack sources • Understand and apply lessons learned from recent attacks on global critical infrastructure 9:00 Optimizing National Cyber Security Resources David Swan Executive Vice President, Defense Intelligence Group Centre for Strategic Cyberspace + Security Science (CSCSS) • Identify and explore the cyber security programs currently available to industry, including leveraging current government-based aid • Compare the resources available in Canada to those in other countries: How does Canada stack up? • What developments need to happen to strengthen cyber resiliency and safeguard critical infrastructure? 9:30 IRT Discussion 1 & 2 Moderated by a cyber-security expert, participate in an informal, dynamic discussion with your counterparts focusing on one aspect of cyber security. Garner insights from the experiences of security leaders which can be integrated into an actionable plan for your organization. 10:50 Networking Break Agenda 11:10 Safeguarding the Interconnected Global Supply Chain from Cyber Vulnerabilities Curtis Levinson United States Cyber Defense Advisor to NATO Vice President Centre for Strategic Cyberspace + Security Science (CSCSS) • Expose and understand the multitude of cyber hazards that threaten the digital supply chain • Debate whether the benefits of interconnectedness outweigh the information technology risks • Establish a competent internal review framework for assessing and limiting supply chain risks and ensure security initiatives are embedded into the life cycle of the vendor-management contract 11:40 IRT Discussion 3 & 4 Moderated by a cyber-security expert, participate in an informal, dynamic discussion with your counterparts focusing on one aspect of cyber security. Garner insights from the experiences of security leaders which can be integrated into an actionable plan for your organization. 1:00 Networking Luncheon
  • 4. 1-877-927-7936 | CanadianInstitute.com/CybersecurityWest CYBER SECURITY SUMMIT WEST CI March 1, 2016 | Marriott Downtown | Calgary a C5 Group Company Business Information in a Global Context 2:00 Seamless Discipline Integration and Inter- Departmental Collaboration Dominic Vogel Independent Cyber Security Contractor • Overcome obstacles and break down silos in order to achieve an effective organization-wide cyber defence strategy • Understand how effectively bridging security gaps can increase organizational resiliency and optimize cyber security • Identify innovative strategies for ensuring seamless collaboration between key departments in your organization 2:30 IRT Discussion 5 & 6 Moderated by a cyber-security expert, participate in an informal, dynamic discussion with your counterparts focusing on one aspect of cyber security. Garner insights from the experiences of security leaders which can be integrated into an actionable plan for your organization. 4:00 CLOSING PANEL Exposing Cyber Vulnerabilities in Industrial Control Systems (ICS) and Implementing Preventative Risk Management Strategies Pierre Janse van Rensburg SCADA Security Specialist ENMAX Power Corporation Hani Mansi Director, Risk and Information Security ATCO Paul Piotrowski Senior PCD Security Strategist, APAC Region Shell Canada • Explore recent global attacks on critical industrial control systems and examine innovative strategies for increasing cyber resiliency for process and control systems • Understand the fragility and vulnerability of these systems within the country’s critical infrastructure sectors • Address the challenge of patch attempts on systems that are designed to be online without disruption 4:30 Closing Remarks from Conference Chair Conference Adjourns 1. Connect personally with Canada’s leaders in cyber security – discuss common challenges and engage in high-level strategic conversations with similar peers 2. Examine the latest threats targeting Canada by learning what to expect and how to prepare for the next five years of cyber-attacks 3. Gain insight into effectively planning, preparing and responding to cyber incidents in order to minimize damage 4. Explore the newest risks associated with Cloud Security and third-party provider vulnerabilities 5. Understand the critical components of an effective insider threat risk management program TOP 5 REASONS TO ATTEND: Agenda
  • 5. 1-877-927-7936 | CanadianInstitute.com/CybersecurityWest CYBER SECURITY SUMMIT WEST CI March 1, 2016 | Marriott Downtown | Calgary Topic 1 Incident Response: Reacting to Cyber Security Incidents • Identify the type of cyber security incident response capability you require and the level of support you need for your specific system • Determine the ways to respond to these attacks in a fast, effective and comprehensive manner • Understand your organization’s “state of readiness” to respond to a cyber-security incident Subject Matter Expert Brian Hamilton Director, Compliance and Special Investigations Office of the Information and Privacy Commissioner, Alberta Solution Provider Sponsorship opportunity is available for this Roundtable Discussion Topic. Contact our Sponsorship Team if you are interested in hosting this table. Topic 2 Cloud Security: Practical Considerations for Maximizing Cyber Resilience on the Cloud • Examine and understand the cyber risks associated with sharing IP assets on the cloud with third parties • Identify the specific types of data that can be securely stored on the cloud and pinpoint emerging areas of concern • Explore current industry cloud standards and verifiable security protocol Subject Matter Expert Contact us if you are interested in hosting this Interactive Roundtable (IRT) session. Solution Provider Sponsorship opportunity is available for this Roundtable Discussion Topic. Contact our Sponsorship Team if you are interested in hosting this table. IRTDiscussionTopics
  • 6. 1-877-927-7936 | CanadianInstitute.com/CybersecurityWest CYBER SECURITY SUMMIT WEST CI March 1, 2016 | Marriott Downtown | Calgary Topic 4 Third Party Provider Threats and Risk Management • Clearly defining the issues organizations should consider in seeking to mitigate your cyber security risk in connection with third party service providers • Develop a vendor management plan • Bolster your internal security Subject Matter Expert Contact us if you are interested in hosting this Interactive Roundtable (IRT) session. Solution Provider Sponsorship opportunity is available for this Roundtable Discussion Topic. Contact our Sponsorship Team if you are interested in hosting this table. Topic 3 Proactive and Compliant Insider Threat Mitigation • Clearly define “Insider Threat” and understand why this type of threat is increasing in frequency • Take inventory of current data paths within the organization and adjust access allowances to ensure maximum protection • Evaluate the effectiveness of available monitoring tools and ensure compliance with legal risks Subject Matter Expert Contact us if you are interested in hosting this Interactive Roundtable (IRT) session. Solution Provider Sponsorship opportunity is available for this Roundtable Discussion Topic. Contact our Sponsorship Team if you are interested in hosting this table. IRTDiscussionTopics
  • 7. 1-877-927-7936 | CanadianInstitute.com/CybersecurityWest CYBER SECURITY SUMMIT WEST CI March 1, 2016 | Marriott Downtown | Calgary Topic 5 BYOD: Data Protection and Information Security Issues • Create a BYOD business policy • Learn which type of corporate data can be processed on personal devices • Explore best practices to store and delete corporate data on personal devices Subject Matter Expert Contact us if you are interested in hosting this Interactive Roundtable (IRT) session. Solution Provider Sponsorship opportunity is available for this Roundtable Discussion Topic. Contact our Sponsorship Team if you are interested in hosting this table. Topic 6 Information Sharing as a Collaborative Approach to Safeguarding Critical Infrastructure • Recognize the growing need for information sharing initiatives and advancing regulations to help protect Canada’s critical infrastructure • Learn best practices for information sharing between organizations in the same sector, as well as between those in different sectors to open the lines of communication • Examine and evaluate current information sharing networks to learn challenges, outcomes, and opportunities Subject Matter Expert Kathy Macdonald Security Professional Retired Calgary Police Awarded Governor General’s Member of the Order of Merit of the Police Forces (M.O.M.) Solution Provider Sponsorship opportunity is available for this Roundtable Discussion Topic. Contact our Sponsorship Team if you are interested in hosting this table. IRTDiscussionTopics
  • 8. 1-877-927-7936 | CanadianInstitute.com/CybersecurityWest CYBER SECURITY SUMMIT WEST CI March 1, 2016 | Marriott Downtown | Calgary Subject Matter Expert Ray Boisvert Senior Associate Hill + Knowlton Strategies As President of I-Sec Integrated Strategies, Ray Boisvert works with a variety of client organizations to help them gain a deeper understanding of intelligence and security matters in a global context, and the impact on their operating environments. He delivers business intelligence solutions, consults on Mergers and Acquisitions with national security complexities, and guides resilience building, particularly in the areas of Cyber Security and Insider Threats. After five years with the RCMP, Ray joined the Canadian Security Intelligence Service (CSIS) in 1984 and retired as Assistant Director, Intelligence in 2012. During his tenure, Ray was involved in broad facets of security intelligence operations - from leadership of the Counter Terrorism domain, to Operational Risk Management, Data Exploitation programs, Human Source management, Foreign Collection and Special Operations. Subject Matter Expert Brian Hamilton Director, Compliance and Special Investigations Office of the Information and Privacy Commissioner, Alberta Brian Hamilton is Director, Compliance and Special Investigations at the Office of the Information and Privacy Commissioner (OIPC) of Alberta. His team investigates potential offences under Alberta’s privacy laws, reviews privacy impact assessments and is responsible for privacy breach response. Prior to his current appointment Brian served as Health Information Act Director and as an Investigator at the OIPC. In 10 years with the OIPC, he has conducted precedent-setting investigations involving data encryption, biometric identification, malware, business continuity and was the lead investigator on Alberta’s first successful privacy offence conviction. Previously, Brian was Manager, Privacy and Security at Alberta Health and Wellness where he led efforts to ensure that Alberta’s heath sector met minimum information security standards and developed a privacy and security audit framework for the health sector. Brian is a past Instructor with the University of Alberta’s Information Access and Privacy Program. Before moving to Alberta, Brian held positions in the New Brunswick public service. Subject Matter Expert Pierre Janse van Rensburg SCADA Security Specialist ENMAX Power Corporation Pierre Janse van Rensburg has 20+ years of broad ranging IT experience in multiple roles and disciplines, including college instructor, network engineer, developer, product manager and system specialist. He has worked in both the public and private sector from small start-ups to large enterprises and has been supporting utility operations for over a decade now focusing on OT (Operational Technology) security for the past 8 years. Pierre is responsible for day-to-day operational security of the SCADA network and coordinating the creation of the CIP standards compliance program for the T&D operations. ParticipantBios
  • 9. 1-877-927-7936 | CanadianInstitute.com/CybersecurityWest CYBER SECURITY SUMMIT WEST CI March 1, 2016 | Marriott Downtown | Calgary Subject Matter Expert Curtis Levinson United States Cyber Defense Advisor to NATO Vice President Centre for Strategic Cyberspace + Security Science (CSCSS) Dr. Curtis Levinson has over 25 years of focused advisory experience in Cyber Security, Information Governance, Cloud Computing, Regulatory Compliance and Continuity of Operations. He is a highly experienced advisor, risk assessor and technology architect specializing in all phases of the security engineering process. Dr. Levinson has served with distinction, two sitting Presidents of the United States, two Chairman of the Joint Chiefs of Staff, and the Chief Justice of the United States. He has been selected by the United States to serve as the US Cyber Defense Advisor to NATO. Dr. Levinson is a frequent consultant, author and lecturer, within the United States and internationally, on a variety of topics related to secure technology, telecommunications, regulatory compliance, counter-terrorism and homeland security. He is an adjunct lecturer for many graduate programs in cyber security and counter-terrorism and a member of the Capitol Technology University Board of Trustees. Subject Matter Expert Kathy Macdonald Security Professional Retired Calgary Police Passionate and hardworking with over two decades of experience in security and law enforcement, Kathy is an internationally recognized voice in the area of cybercrime prevention, online abuse, cyberbullying, identity crime and privacy protection. Kathy currently serves on the Board’s of ISC(2) Alberta Chapter and Common Sense Calgary. She is also an Industry Attaché for Stop. Think. Connect., a global messaging convention unifying the response to cybercrime worldwide. Kathy is a published writer, media spokesperson and a guest speaker at hundreds of local and international conferences. In 2009, Kathy was Invested with the Governor General of Canada Award, Member of the Order of Merit of the Police Forces (M.O.M.), for her work serving the community in the area of cybercrime awareness. Subject Matter Expert Hani Mansi Director, Risk and Information Security ATCO Mr. Hani Mansi has focused his career on the creation, management and optimization of Information Security and Cyber-security Programs. In doing so, Mr. Mansi has fulfilled the role of Chief Information Security Officer (CISO). Over the past twenty five years, Mr. Mansi has participated in Operational and Enterprise Risk Management committees and provided updates to the Audit Committee of the Board of Directors. Mr. Mansi’s portfolio of responsibilities includes but is not limited to implementing and maintaining risk management, policy creation, governance, strategy, and compliance practices. Currently, Mr. Mansi is the Director of Risk and Information Security for the ATCO Group of Companies. ParticipantBios
  • 10. 1-877-927-7936 | CanadianInstitute.com/CybersecurityWest CYBER SECURITY SUMMIT WEST CI March 1, 2016 | Marriott Downtown | Calgary Subject Matter Expert David Swan Executive Vice President, Defense Intelligence Group Centre for Strategic Cyberspace + Security Science (CSCSS) David Swan is a CSCSS Executive Vice President and leads the CSCSS Defence Intelligence Group (C/DIG) which focuses on transnational / International threats against nations including infrastructure and strategic industries. David’s working career spans a dynamic technical background and service in the Canadian Military Reserve. Twice employed as a Chief Technical Officer (CTO), he experienced attempts to acquire his company’s Intellectual Property (IP). Since 2009 he has provided specialized computer security consulting including cyberintelligence and geopolitical analysis. In the Canadian military, David enjoyed success as: a Naval Communicator, a Naval Officer (Operations) and an Army Intelligence Officer. His assignments included work on a number of military computer systems. David continued to contribute to the Army at the Unit, and Brigade levels until he retired in 2013. David’s military career has included work with U.S. military (Coast Guard, Navy and USMC), U.K. (Navy and Army) and NATO. Subject Matter Expert Dominic Vogel Independent Cyber Security Contractor Dominic Vogel has an established track record of forming positive security cultures and has been intimately involved with IT Security in organizations of all sizes. He has a wide-range of experience having served critical roles in numerous projects including creating security strategy, policy development, endpoint security, and threat management in a multitude of industries (financial services, logistics, transportation, and government just to name a few). Having worked within large and globally diverse organizations he has extensive security experience that has been forged over the past decade as an information security professional. Dominic is well regarded as a skilled communicator having been a security blogger for the renowned IT website TechRepublic. He has performed as a keynote speaker for Blancco Canada Security Days, Vancouver IEEE Career Day, Delta Chamber of Commerce, NYIT Vancouver Cyber Security Symposium, Vancouver Enterprise Forum, and Vancouver ISACA. ParticipantBios Subject Matter Expert Paul Piotrowski Senior PCD Security Strategist, APAC Region Shell Canada Paul is currently a Global Process Control Domain IT Security Technical Authority for operating assets and capital projects at Royal Dutch Shell. He has over 15 years of IT Security experience and has travelled extensively internationally during his career with Shell. He holds several certifications including the GICSP (Global Industrial Cyber Security Professional) and CISSP. He is locally based out of the Calgary Shell office.
  • 11. 1-877-927-7936 | CanadianInstitute.com/CybersecurityWest CYBER SECURITY SUMMIT WEST CI March 1, 2016 | Marriott Downtown | Calgary HOW TO APPLY CI Connect events are by invitation only. If you are a senior executive involved in cyber security in energy, utilities, government, finance, ICT, transportation, law enforcement or the health sectors, please request an application to attend this event. To apply or to suggest a subject matter expert to host an Interactive Roundtable Topic, contact: Yuga Prem Director Delegate Sales 1-877-927-0718 ext. 7373 Y.Prem@CanadianInstitute.com You will be notified within 1-3 business days of receiving your application if you have been accepted. REGISTRATION FEE The cost of registration is $995. If you have been approved to attend, we will send you a registration email with conference and billing information. SPONSORSHIP OPPORTUNITIES To suggest a solution provider to host an Interactive Roundtable Topic, contact: Dan Gellman Director of Sponsorship 1-877-927-0718 ext. 7389 D.Gellman@CanadianInstitute.com ParticipantsTopic Subject Matter Expert (Host) Solutions Provider (Host) Interactive Roundtable Discussions (IRT) Topic 1 Reacting to Cyber Security Incidents Topic 2 Practical Considerations for Maximizing Cyber Resilience on the Cloud Topic 3 Proactive and Compliant Insider Threat Mitigation Topic 4 Information Sharing as a Collaborative and Dedicated Approach to Safeguarding Critical Infrastructure Topic 5 BYOD: Data Protection and Information Security Issues Topic 6 Third Party Provider Threats and Risk Management IRT Rotation Depicted INTERACTIVE ROUNDTABLE (IRT) FORMAT EXPLAINED: • Participants are divided into designated groups • Each group visits every table for a 40-minute discussion • Each table is moderated by a subject expert and solution provider, featuring a different discussion topic • After each 40-minute discussion, each group follows the directional arrow to the next IRT and has a new conversation on a new topic • Keynote presentations and panels break-up the day between IRT rotations WHY YOU’LL LOVE THIS FORMAT: • Interact with leading subject-matter experts in cyber security • Escape ‘death’ by PowerPoint • Participate in an intimate group setting to stimulate high-level strategic discussions • Learn with peers to share similar challenges and issues