Toronto CISO Inner Circle

August 29, 2019 , Arcadian Court

August 29, 2019
Arcadian Court

Collaborate with your peers

Get together with your peers to tackle top business challenges through peer-driven content and discussions at the Toronto CISO Inner Circle.

Join your peers to discuss the most critical issues impacting CISOs today:

Investing in your people and the right technologies 

Innovating with advanced technologies and new delivery models

Influencing business stakeholders and enterprise outcomes

Toronto CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Co-Chairs

Zaki Abbas headshot

Zaki Abbas

Brookfield Asset Management
VP, CISO

Samer Adi headshot

Samer Adi

Interac
VP Infrastructure and CISO

Susan Berezny headshot

Susan Berezny

Royal Canadian Mint
Director, Information Security

Adam Evans headshot

Adam Evans

Royal Bank of Canada
VP, Cyber Operations & CISO

Jason Hall headshot

Jason Hall

Enbridge Inc.
VP CISO

Bobby Singh headshot

Bobby Singh

Toronto Stock Exchange
CISO & Global Head of Infrastructure Services

Jeff Stark headshot

Jeff Stark

IGM Financial Inc.
Vice President Technology Risk & CISO

Stephen Weston headshot

Stephen Weston

Canadian Tire
VP & CISO

Agenda


August 29, 2019

4:00pm - 5:00pm  Executive Networking Reception

5:00pm - 6:30pm  Discussion Topics

An Embedded & Sustainable Culture of Security

Salman Ashraf headshot

Salman Ashraf

Director IT Security and Risk

Travelers Canada

Jason Barr headshot

Jason Barr

CIO & CISO

Aptean

David Cullen headshot

David Cullen

CISO

AGF Management Limited

Waruna Jay headshot

Waruna Jay

Head, Infrastructure Operations and IT Workplace Services Canada

Labatt Breweries of Canada

Terence Lam headshot

Terence Lam

Senior Security & Compliance Officer

Aecon Group Inc.

Farooq Naiyer headshot

Farooq Naiyer

CISO

ORION

Kashif Parvaiz headshot

Kashif Parvaiz

CISO

University Health Network

Sharmila Sivasankaran headshot

Sharmila Sivasankaran

Director, Security, Quality & Compliance

Klick Health

Do you know who your champions are? Just as risk management is about so much more than being compliant, creating a culture of security requires more than baseline awareness. It’s about creating champions – in your Board, employees, and your customers. It’s also about enmeshing security into the heart of your digital vision and core business processes with security-first mindsets. Uncover tangible steps with your peers to weave security into the fabric of your organization’s culture and competitive position.  

Processes and Planning

  • Where does responsibility for security lie within your organization (and where should it lie)? Centralized within a single group, across several groups, with department heads?
  • When launching digital initiatives, what are some tactics you’ve employed to bring security into the conversation early and continuously?
  • What tools or frameworks (SOAR tools, virtualization, etc) do you use to gain insight into evolving systems, devices, things, and data across your environment? How do you maintain visibility into new tools and initiatives that may increase risk?  

One Size Fits None?

  • Security awareness needs are unique to every organization: How successful would you consider your current security awareness programs, and how do you measure them?
  • Moving past awareness and into engagement: how do you tailor security education for every part of the business (first-level to the Board)? What are some strategies that work to embed security into everyday activities and functions?
  • Do you have/are you planning to launch a “security champion” program? How do you identify and train potential champions, and with whom should CISOs partner to lead/launch the program?  

Thriving and Sustainable

  • How do you continuously draw clear connections between business objectives and risk?
  • How do you balance business autonomy and scale in deploying new digital technologies with security controls? What safeguards need to be in place?
  • Digital customers (internal and external) expect a level of personal control and customization – how should CISOs look at delivering on those expectations while still minimizing risk?
  • As a security leader, how do you specifically build your influence in the organization, and the influence of the security function?

6:30pm - 7:00pm  Networking Break

7:00pm - 8:00pm  Summary Discussion & Dinner

8:00pm - 9:00pm  Social Hour

Location


Your Community Partners


National Sponsors
Local Sponsors

Toronto CISO Program Manager


For inquiries related to this event, please reach out to your dedicated program manager.

Nick Hall

971-717-6666

nick.hall@evanta.com