
Toronto
CISO Community
Virtual Executive Summit
June 3, 2021 | 8:00am - 1:00pm EDT
June 3, 2021 | 8:00am - 1:00pm EDT
Collaborate with your peers
Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Toronto CISO Virtual Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Accelerating security to match the pace of digital business initiatives
Managing the risk created from a landscape of new core technologies
Achieving sustainability for the CISO role without compromising outcomes
Governing Body Co-Chairs

Zaki Abbas
Brookfield Asset Management
SVP, CISO

Michael Dundas
CIBC
Senior Director, Risk Management Services

Adam Evans
Royal Bank of Canada
VP, Cyber Operations & CISO

Jason Hall
Scotiabank
VP Enterprise Security
What to Expect
Connect with your CISO community through a variety of different session formats at the upcoming Virtual Executive Summit. You'll have the opportunity to listen, engage and create lasting relationships with like-minded peers.
Meet the Speakers
Don't miss this opportunity to meet with CISO practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the Toronto community.
Agenda
June 3, 2021
11:30am - 1:00pm EDT Virtual Peer-to-Peer Meetings
Peer-to-Peer Meetings
Meet virtually for in-depth conversations with your colleagues
8:00am - 8:45am EDT Virtual Summit Keynote
Taking a Risk Based Approach to Data Governance

Rod Hynes
Director, Information Security
Bell Canada

Jeff Curtis
Chief Privacy Officer
Sunnybrook Health Sciences Centre

Faiza Kacem
Head Americas - Operational Resilience, Crisis Management, and Third Party Tech Risk
BNP Paribas Canada
Data is the primary target in virtually every breach scenario – and protecting data gets harder every day. Mix overly provisioned access rights with a plethora or unknown risks, it is no wonder why data stores are so difficult to control and so susceptible to attack. How can CISOs approach a problem that is so big and complex?
Join this keynote and discuss:
- Strategies to map and govern data
- How to gain visibility into high risk areas
- Ways to stay ahead of the compliance curve
8:45am - 9:00am EDT Break
9:00am - 10:00am EDT Virtual Summit Boardroom
The Threat Landscape - Protecting Your Privileges
Hosted by BeyondTrust

Michael Dundas
Senior Director, Risk Management Services
CIBC

Ragulan Sinnarajah
VP, IT Shared Services & Head of Cyber Security
Sobeys

Morey Haber
Chief Technology Officer, Chief Information Security Officer
BeyondTrust
Identifying, classifying, and mitigating risk is the cornerstone of CISOs overarching security strategy. With the explosion of privileged accounts, unpatched vulnerabilities, and remote workers shrinking the windows of exposure across a widening attack surface is no easy task.
Join this session to discuss:
- How to implement the principle of least privilege
- Ways to improve the security of a remote workforce
- Key trends based on 12 months of Patch Tuesdays
9:00am - 10:00am EDT Virtual Summit Boardroom
Building the Identity Platform of the Future
Hosted by Auth0

Andrew Faber
Director Security Technology Services
Toronto Pearson Airport

Craig Newell
Director, Cyber Security
Liquor Control Board of Ontario

Jameeka Green Aaron
CISO
Auth0
Digital transformation has created a convergence of users, devices, and applications that demands an identity-based security approach. With the identity perimeter exposed, CISOs need new and better ways to protect it.
Join this interactive boardroom conversation to discuss:
- Strategies to reach frictionless IAM
- How identity can protect against automated attacks
- The future of IAM including passwordless authentication
9:00am - 10:00am EDT Virtual Summit Boardroom
Next-Gen Third Party Risk

Omar Al-Assaf
Bank Information Security Officer
American Express

Ranjika Manamperi
Vice President Cybersecurity & CISO
Ontario Power Generation
In this era of digital transformation, organizations rely heavily on their third parties, however, third-party relationships come with risks. To help mitigate those risks, CISOs must work closely with their partners to ensure security.
Join this session to discuss:
- Strategies to establish a process for continuous assessment and monitoring of third parties
- How to create an accurate inventory of all vendors within your ecosystem
- What to do when your third party gets breached
9:00am - 10:00am EDT Virtual Summit Boardroom
Optimizing Security Operations

Michael Balenzano
Manager, Network Services
Lactalis Canada

Andrey Spiwak
Director, Cyber Incident Management
John Hancock

Danny Sutantyo
Director, Information Security, Compliance and IT Operations
Sunwing Travel Group
Finding the right design for an effective security operations center is a complex leadership challenge weaving technology, budget, talent management and, of course, risk. Learn what questions you should be asking yourself, and other senior leaders, to ensure your SOC is up to par.
Join this session to learn:
- Models for effective insource, outsource and hybrid SOCs
- Leadership best practices for keeping employees engaged and alert
- The latest workflows for effective incident response
10:00am - 10:45am EDT Virtual Summit Keynote
Taking Control in the Cloud
Hosted by IBM

Mike Melo
CISO
LifeLabs

Brad Stocking
Associate Partner, IBM Security
IBM
Are you challenged with uncontrolled costs and unknown risks from your adoption of cloud services? Concerned with whether your IaaS investments are endangering your security or compliance? Or perhaps you’re just watching your budget disappear seemingly on its own. You are not alone.
Join your peers for a discussion around:
- Optimizing the cost of the cloud
- Improving security, compliance and governance in cloud architectures
- Leveraging the resources and controls you already have
By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address: ibm.biz/marketingoptout.
10:45am - 11:00am EDT Break
11:00am - 11:30am EDT Networking
Meet the Speakers
Don't miss this opportunity to meet with CISO practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the Toronto community.
June 3, 2021
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.