Toronto CISO Virtual Executive Summit

June 3, 2021 | 8:00am - 1:00pm EDT

June 3, 2021 | 8:00am - 1:00pm EDT


Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Toronto CISO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Accelerating security to match the pace of digital business initiatives

Managing the risk created from a landscape of new core technologies

Achieving sustainability for the CISO role without compromising outcomes


Zaki Abbas

Brookfield Asset Management

Michael Dundas

Senior Director, Risk Management Services

Adam Evans

Royal Bank of Canada
VP, Cyber Operations & CISO

Jason Hall

VP Enterprise Security

Mike Melo


What to Expect

Connect with your CISO community through a variety of different session formats at the upcoming Virtual Executive Summit. You'll have the opportunity to listen, engage and create lasting relationships with like-minded peers.


Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join intimate, interactive discussions with peers in Boardroom sessions.

Meet the Speakers

Don't miss this opportunity to meet with CISO practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the Toronto community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. Be sure to opt in when you register and get matched based on your key priorities.


June 3, 2021

8:00am - 8:45am  EDT Virtual Summit Keynote

Taking a Risk Based Approach to Data Governance

Rod Hynes headshot

Rod Hynes

Director, Information Security

Bell Canada

Jeff Curtis headshot

Jeff Curtis

Chief Privacy Officer

Sunnybrook Health Sciences Centre

Faiza Kacem headshot

Faiza Kacem

Head Americas - Operational Resilience, Crisis Management, and Third Party Tech Risk

BNP Paribas Canada

Data is the primary target in virtually every breach scenario – and protecting data gets harder every day. Mix overly provisioned access rights with a plethora or unknown risks, it is no wonder why data stores are so difficult to control and so susceptible to attack. How can CISOs approach a problem that is so big and complex?

Join this keynote and discuss:

  • Strategies to map and govern data
  • How to gain visibility into high risk areas
  • Ways to stay ahead of the compliance curve

8:45am - 9:00am  EDT Break

9:00am - 10:00am  EDT Virtual Summit Boardroom

The Threat Landscape - Protecting Your Privileges

Michael Dundas headshot

Michael Dundas

Senior Director, Risk Management Services


Ragulan Sinnarajah headshot

Ragulan Sinnarajah

VP, IT Shared Services & Head of Cyber Security


Morey Haber headshot

Morey Haber

Chief Technology Officer, Chief Information Security Officer


Identifying, classifying, and mitigating risk is the cornerstone of CISOs overarching security strategy. With the explosion of privileged accounts, unpatched vulnerabilities, and remote workers shrinking the windows of exposure across a widening attack surface is no easy task.

Join this session to discuss:

  • How to implement the principle of least privilege
  • Ways to improve the security of a remote workforce
  • Key trends based on 12 months of Patch Tuesdays

9:00am - 10:00am  EDT Virtual Summit Boardroom

Building the Identity Platform of the Future

Andrew Faber headshot

Andrew Faber

Director Security Technology Services

Toronto Pearson Airport

Craig Newell headshot

Craig Newell

Director, Cyber Security

Liquor Control Board of Ontario

Jameeka Green Aaron headshot

Jameeka Green Aaron



Digital transformation has created a convergence of users, devices, and applications that demands an identity-based security approach. With the identity perimeter exposed, CISOs need new and better ways to protect it. 

Join this interactive boardroom conversation to discuss: 

  • Strategies to reach frictionless IAM 
  • How identity can protect against automated attacks 
  • The future of IAM including passwordless authentication

9:00am - 10:00am  EDT Virtual Summit Boardroom

Next-Gen Third Party Risk

Omar Al-Assaf headshot

Omar Al-Assaf

Bank Information Security Officer

American Express

Ranjika Manamperi headshot

Ranjika Manamperi

Vice President Cybersecurity & CISO

Ontario Power Generation

In this era of digital transformation, organizations rely heavily on their third parties, however, third-party relationships come with risks. To help mitigate those risks, CISOs must work closely with their partners to ensure security.

Join this session to discuss:

  • Strategies to establish a process for continuous assessment and monitoring of third parties
  • How to create an accurate inventory of all vendors within your ecosystem
  • What to do when your third party gets breached

9:00am - 10:00am  EDT Virtual Summit Boardroom

Optimizing Security Operations

Michael Balenzano headshot

Michael Balenzano

Manager, Network Services

Lactalis Canada

Andrey Spiwak headshot

Andrey Spiwak

Director, Cyber Incident Management

John Hancock

Danny Sutantyo headshot

Danny Sutantyo

Director, Information Security, Compliance and IT Operations

Sunwing Travel Group

Finding the right design for an effective security operations center is a complex leadership challenge weaving technology, budget, talent management and, of course, risk. Learn what questions you should be asking yourself, and other senior leaders, to ensure your SOC is up to par.

Join this session to learn:

  • Models for effective insource, outsource and hybrid SOCs
  • Leadership best practices for keeping employees engaged and alert
  • The latest workflows for effective incident response

10:00am - 10:45am  EDT Virtual Summit Keynote

Taking Control in the Cloud

Mike Melo headshot

Mike Melo



Brad Stocking headshot

Brad Stocking

Associate Partner, IBM Security


Are you challenged with uncontrolled costs and unknown risks from your adoption of cloud services? Concerned with whether your IaaS investments are endangering your security or compliance? Or perhaps you’re just watching your budget disappear seemingly on its own. You are not alone.

Join your peers for a discussion around:

  • Optimizing the cost of the cloud
  • Improving security, compliance and governance in cloud architectures
  • Leveraging the resources and controls you already have

By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address:

10:45am - 11:00am  EDT Break

11:00am - 11:30am  EDT Networking

Meet the Speakers

Don't miss this opportunity to meet with CISO practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the Toronto community. 

11:30am - 1:00pm  EDT Virtual Peer-to-Peer Meetings

Peer-to-Peer Meetings

Meet virtually for in-depth conversations with your colleagues


Your Community Partners

Key Partner
Program Partners

Toronto CISO Program Manager

For inquiries related to this event, please reach out to your dedicated program contact.

Nick Hall

Senior Program Manager