
Toronto CISO Executive Summit
June 14, 2022 | Marriott Downtown at CF Toronto Eaton Centre
June 14, 2022
Marriott Downtown at CF Toronto Eaton Centre
Collaborate with your peers
Get together with Toronto's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Supporting business agility with risk-based programs
Evaluating, communicating and responding to evolving threats
Building a culture of security to enable smart, secure decision-making
Toronto CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.
Governing Body Co-Chairs

Zaki Abbas
Brookfield Asset Management
SVP, CISO

Michael Dundas
Manulife
AVP, Cyber Protection

Sandra Liepkalns
Choice Properties REIT
VP, Information Security & Data Governance

Ranjika Manamperi
Ontario Power Generation
Vice President Cybersecurity & CISO
What to Expect
Agenda
June 13, 2022
June 14, 2022
7:30am - 8:15am Registration & Breakfast
8:15am - 9:00am Keynote
Creating and Jumpstarting an Inclusive Culture
Hosted by Salt Security

Keith Wyche
Vice President, Community Engagement and Support
Walmart
In the wake of major social and political change over the past decade, employers large and small alike have taken steps to increase diversity, equity, and inclusion. Yet despite growing pressure and awareness, progress is slow and most corporate DE&I initiatives are not yet achieving the desired results. With so many steps forward, how come representation still is not where it needs to be at senior levels for almost every diverse group?
Join this session to learn more as Keith Wyche:
- Provides real, actionable steps for those who are serious about DE&I, and looking for solutions to improve the experience of Black and other underrepresented groups, colleagues and leaders within the organization
- Shares a collection of best practices backed by research and strategies
- Provides a roadmap for leaders to create breakthrough change that explores meaningful topics
9:00am - 9:30am Networking Break
9:30am - 10:15am Breakout Session
Leading Through Cyber Crisis — Combating Today’s Emerging Attacks
Hosted by eSentire

Rob McLeod
Vice President, Threat Response Unit
eSentire

Ryan Westman
Senior Manager, Threat Intelligence
eSentire
Cybersecurity business leaders must demonstrate vision, agility, and flexibility to build truly responsive security operations capable of combating today’s emerging attacks.
Join eSentire Threat Response Unit (TRU) experts Rob McLeod & Ryan Westman, as they share 3 unique cases of leading through crisis, demonstrating how you too can govern with proactivity and confidence in order to reclaim the advantage over new cyber attack methods.
Case studies and discussions will cover:
- How to address targeted and opportunistic threats stemming from global geopolitical tensions
- Evolving your defenses to protect the spectrum of ransomware as a service
- Containing the impact of aggressive extortion attacks
9:30am - 10:15am Breakout Session
Communicating Risk Through Your Organization
Hosted by CyberArk

Steve Ferrigni
Chief Information Security Officer and Director of Security
CSA Group

Heloisa Ribeiro
Head of the Cybersecurity Program, Enterprise Information Security
EDC
CISOs aren't just cybersecurity experts with a wealth of experience as practitioners – they're also business leaders. That means being fluent in the technical language of security and risk management isn't enough: CISOs need to know how to effectively communicate and champion security initiatives across all levels of the organization, from technology SMEs to senior leadership and the board.
In this collaborative session, Steve Ferrigni and Heloisa Ribeiro will present a series of real-world risk scenarios and facilitate an interactive discussion on how to systematically evaluate and manage risk and encouraging a culture that embraces risk management across all functions.
9:30am - 10:15am Executive Boardroom
Zero Trust – Hype or Hope?
Hosted by IBM

Phil Fodchuk
National Threat Management Leader
IBM

Davis Arora
Senior Director of Cyber Security
Honeywell

Manas Giri
CISO
WestJet
An organization's ability to achieve successful digital transformation is in large part enabled by the security team. Distributed, loosely connected infrastructure and tools, coupled with the demand for almost any-to-any connectivity, complicates the mission. Regularly defined as being delivered by a single "silver bullet" point solution, the term zero trust is now often held in poor regard. It is however, a highly effective conceptual framework, and perhaps even a cultural shift, that many organizations have been working with for several years.
Join this interactive boardroom hosted by IBM to discuss:
- The broader definition of what a zero trust framework is
- The foundational control required to build a zero trust program
- Strategies for improving the user experience and proving value to get organization-wide acceptance
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact: Nick Hall at nick.hall@evanta.com.
9:30am - 10:15am Executive Boardroom
Beyond Initial Intrusion – Defending Against Advanced Threats on the Network
Hosted by ExtraHop

Jappreet Bath
Senior Sales Engineer
ExtraHop

Sandra Liepkalns
VP, Information Security & Data Governance
Choice Properties REIT

Aamir Bhaijiwala
Director Information Security
Chartwell Retirement Residences
Based on Gartner research, 75 percent of cybersecurity budgets go to preventing initial intrusion and only 25 percent on detection and mitigation. However, the real damage to the enterprise happens once the attacker is already inside the network, working their way toward carrying out a costly breach or extortion.
Join this boardroom to discuss:
- Key areas to reduce cyber risk and build resilience
- The advanced attack techniques that bad actors are forced to rely on and how to spot them
- Strategies to increase the speed of detection and mitigation
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact: Nick Hall at nick.hall@evanta.com.
10:15am - 10:45am Networking Break
10:20am - 10:45am Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
10:45am - 11:30am Breakout Session
Third-Party Cyber Risk — Zero-Day Findings and Mitigation
Hosted by BlueVoyant

Joel Molinoff
Vice Chairman
BlueVoyant
Managing distributed risk is today’s defining cybersecurity challenge. Mitigation of zero-day vulnerabilities is critical as adversaries exploit supply chain entities. This session explores how to identify all third parties impacted by zero-day vulnerabilities and guide their mitigation efforts. Your vendor, supplier, and partner ecosystem is now your enterprise attack surface.
Join this session hosted by BlueVoyant to learn:
- How to manage distributed risk associated with hundreds and even thousands of vendors, suppliers, and partners
- Approaches to identify, prioritize, and mitigate active threats and critical/zero-day vulnerabilities
- Strategies to reduce supply chain/external ecosystem risk associated with zero-day
10:45am - 11:30am Breakout Session
Actionable Intelligence — Keeping Pace with Relentless Threats
Hosted by SentinelOne

Priya Sirwani
Global CISO
Fiera Capital

Tom Verhoog
Global Information Security Manager
Celestica
Efficiently employing actionable threat intelligence is key to staying ahead of the next wave of threats. A fast-moving threat intelligence program that highlights the latest risks can spell the difference between preventing a breach or becoming the next headline. How can CISOs sift through the deluge of information?
Join this session to hear security leaders discuss:
- Pinpointing and using actionable threat intelligence
- Better leveraging their peer communities to share threat intel
- Keeping up with the evolving nature of today’s threat landscape
10:45am - 11:30am Breakout Session
Data Doesn’t Lose Itself
Hosted by Proofpoint

John Checco
Resident CISO
Proofpoint
Your people are your most valuable asset, your greatest vulnerability, and your best defense. CISOs seeking to prevent data loss from malicious, negligent or compromised users can correlate content, behavior and threats for better insight and streamlined investigations.
Join this session to discuss:
- Augmenting your data protection program with the right people and processes
- Transforming your employees into effective data defenders
- Managing insider threats and preventing data loss at the endpoint
10:45am - 11:30am Executive Boardroom
Defend the Endpoint — Accelerate Recovery
Hosted by CrowdStrike

Jeff Worthington
Executive Strategist
CrowdStrike

Dan Di Salvo
VP, Infrastructure & Security Services
Maple Leaf Foods

Jeff Stark
CISO
Fasken
Adversaries are increasingly fast and stealthy, don’t respect time zones or holidays, and often execute damaging intrusions in hours. Every second matters when under attack and the first steps taken in the wake of a threat can determine success or downtime and disruption. How are you ensuring you have the tools and processes to protect your endpoints and the organization from today’s threats?
Join this interactive discussion for strategies to:
- Deploy the right endpoint security tools to stop an adversary with speed
- Identify resources to appropriately implement, operate and maintain an effective security program
- Secure critical applications even in a state of compromise
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact: Nick Hall at nick.hall@evanta.com.
10:45am - 11:30am Executive Boardroom
Elevating AppSec to a Board-Level Discussion
Hosted by Veracode

Sohail Iqbal
CISO
Veracode

Sohaib Syeed Ahmed
Information Security Officer
First National Financial

Kush Gidda
Director, Application Security
Zynga
As we’ve all learned (sometimes painfully — or worse, publicly), the open source libraries and resources developers use to build applications faster also come with vulnerabilities that can all-too-easily make it into products. Board members have learned these lessons, too, and now want more frequent updates and insight into security initiatives.
Join this boardroom hosted by Veracode to discuss bringing the AppSec conversation into the boardroom. You'll leave with actionable tips and advice on:
- Understanding board members’ concerns and priorities
- Presenting information and metrics in a way that board members understand
- Getting board buy-in on your plans and budget to stay ahead of the threat landscape and innovation curve
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact: Nick Hall at nick.hall@evanta.com.
11:30am - 11:40am Break
June 13, 2022
June 14, 2022
Location
Venue & Accommodation
Marriott Downtown at CF Toronto Eaton CentreParking and Transportation
Information regarding parking and transportation can be found here.
Health and Safety Local Guidelines
To ensure the well-being of participants, partners, and associates, we will continue to monitor and adhere to government, venue, and health agency guidelines.
As a part of our commitment to create the safest possible environment, we are requiring all participants, partners, and associates to be fully vaccinated to participate in in-person programs, in addition to completing a health status attestation prior to arrival. Please refer to our COVID-19 Health and Safety Protocols for up-to-date local guidelines.
A block of rooms has been reserved at the Marriott Downtown at CF Toronto Eaton Centre at a reduced conference rate. Reservations should be made online or by calling 1-416-597-9200.
Deadline to book using the discounted room rate of $319 USD (plus tax) is May 26, 2022.
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.