7:30 AM
|
Registration and Continental Breakfast
|
|
8:00 AM
|
Opening Remarks from the Chair
|
|
Director, National Security and Strategic Foresight
The Conference Board of Canada
|
|
|
8:30 AM
|
Plenary Session 1
From DevOps to DevSecOps: It’s About Building an Effective Program Level Strategy
Many times, discussion on software security focuses at the project level. This leads to further discussion on activities like pen testing, code scanning, and user stories. This is like assuming we simply need to inject "security requirements into DevOps". But that is not enough.
When discussing DevSecOps, we actually need to align DevOps, Compliance, Audit, and Business teams. Static DevSecOps models are too rigid and brittle in this regard. What we need to drive DevSecOps is program level thinking. This means discussing future state competencies, governance, and risk management.
In this session, you will learn about how to transition from DevOps to DevSecOps using a more programmatic approach.
|
|
Research Director
Security Compass
|
|
|
9:15 AM
|
Plenary Session 2
Security Begins with Effective Leadership: How to Build and Facilitate Effective Cyber Security within Boards
When developing a cyber security strategy for your organization two issues need to be top of mind. First, who owns and leads security, and second, whose input and expertise do you need to create effective security and sustainable resilience in the long term.
Many organizations focus on "what" to secure and forget about the "how". In this session, you will hear about the complexity of securing the most sensitive and critical part of any organization: the board.
What happens when you need to secure the boardroom? Is it even possible for the IT guy to secure the C-level? How can you make the chairman comply with any security procedure?
|
|
Chief Technology Officer
DiliTrust
|
|
|
10:00 AM
|
Networking Break
|
|
10:30 AM
|
Plenary Session 3
Sharing Cyber Threat Information
Session details to be advised.
|
|
Vice-President, Head of Cyber Defense
Visa
|
|
|
11:15 AM
|
Plenary Session 4
Resilience Through Insurance: Understanding the Uses and Limits of Cyber Insurance
As breaches of cyber security and their associated costs increase, more organizations are looking to cyber insurance to ensure that they have the financial resources to recover.
As the financial costs alone for a breach can be huge, insurance has an obvious appeal. Yet the industry has not grown at the same rate as the exposure to risk. In this session, you will hear about the advantages cyber insurance offers as well as the questions you should be asking when considering using insurance to create greater resiliency for your organization.
|
|
Senior Vice-President, Strategic Initiatives
Insurance Bureau of Canada
|
|
|
12:00 PM
|
Networking Luncheon
|
|
1:00 PM
|
Plenary Session 5
The Ever Evolving Threat Landscape
The only constant in cybersecurity is change. Advanced cyberattacks threaten our organizations continue to evolve in sophistication and speed. So how do we keep up? In this talk, Shawn will give an overview of the landscape and provide battle-proven solutions which systematically raise the bar to make your organization both responsive and resilient. Additionally, we will take a forward look to discuss some predictions for 2018 and beyond.
|
|
Executive Director
Canadian Cyber Threat Exchange (CCTX)
|
|
|
1:45 PM
|
Plenary Session 6
Developing an Effective Communication Strategy for After a Breach
In the event of a breach the reputational costs and damage to the brand can be far greater than the direct financial cost. And the damage can be huge and long lasting.
How an organization appears and communicates after an incident has a huge impact. Badly handled communications can lead to lasting irreparable and even terminal damage.
In this session, Andrea Mandel Campbell will discuss what you can do now to prepare for a breach and the specific challenges of cyber incidents—the similarity with other crisis communications. She will share what she has learned as a seasoned communicator from organizations that have acted in a timely and effective manner and those who dropped the ball.
|
|
Senior Vice-President
Teneo Strategy
|
|
|
2:30 PM
|
Refreshment Break
|
|
2:45 PM
|
Plenary Session 7
Surviving a Cybersecurity Breach
Executing an effective response to a cyber-attack is often one of the most important factors in determining the impact of the breach on the organization and others who may be affected.
A well-handled response will mitigate potentially staggering reputational, operational and legal risks and liability. A poorly-handled response can not only aggravate the consequences of the breach and increase risk and exposure, but also give rise to separate heads of exposure for an organization.
This session will provide key insights and lessons learned for how to handle cybersecurity breaches.
|
|
Partner, Chair of Privacy and Information Protection Group
Fasken Martineau
|
|
|
3:30 PM
|
Plenary Session 8
Cyber Coaching for Resiliency: Applying The Lessons of Prior Breaches
Justin Fong is a Partner at Deloitte, leading the Western Canadian Cybersecurity Practice. Over the last 16 years he has had the opportunity to evolve with this critical risk we all face. This session will provide a high level update on the current cybersecurity landscape to help us better understand what we are up against. What key risks and potential mitigations should be in place for any organization and focus on lessons learned from his past incident response experiences.
Justin will examine what has changed in the field, who are the attackers, what motivates them and lessons learned from numerous breaches.
|
|
Partner, Wester Canadian Cybersecurity Practice
Deloitte
|
|
|
4:15 PM
|
Closing Remarks from the Chair
|
|
Director, National Security and Strategic Foresight
The Conference Board of Canada
|
|
|
|