
Toronto CISO Community
Executive Summit
December 3, 2025 | Marriott Downtown at CF Toronto Eaton Centre
December 3, 2025
Marriott Downtown at CF Toronto Eaton Centre
Collaborate with your peers
Get together with Toronto's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Recalculating risk appetites across the C-suite and strengthening relationships accordingly
Streamlining user access through intelligent technologies
Balancing security best practices with business needs to drive innovation and resilience
Toronto CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Governing Body Co-Chairs

Sandra Liepkalns
Choice Properties REIT
VP, Information Security & Data Governance

Olivera Zatezalo
Ontario Power Generation
CISO & VP, Cyber and IT Security
What to Expect
Agenda
Executive Boardroom Sessions
AppSec Revolution—Driving Efficiency with Context and Culture
Traditional security practices are struggling worldwide against modern threats and the rapid pace of software development. The solution lies in leveraging production data, which enables effective Application Detection and Response (ADR) by integrating real-time insights into code behavior, vulnerabilities, and attacks. This approach empowers development and operations teams across borders to collaboratively enhance security.
Join this roundtable to discuss:
- Identifying what’s wrong with the current approach to protecting Apps and APIs
- Enhancing vulnerability scanning with real production insights
- Strengthening attack protection with contextual awareness
Communicating and Measuring Cyber Risk More Effectively
In today’s environment, it is even more challenging for security leaders to communicate and measure their cyber risk and program to their executive board. Being fully transparent about an organization’s weaknesses, strengths, and investments as it relates to cyber risk can be an uncomfortable conversation to have, but it is essential to the overall health of the business.
Join this session to learn:
- Metrics that quantify challenges & risks
- How to create trust with dialogue delivery and engage leadership with non-security terms
- Using data to communicate and explain the risks and how to best leverage this data
Building a Secure Foundation for Data-Driven Digital Transformation
Establishing a secure data governance and protection program that successfully aligns with business priorities is paramount — especially as organizations race to identify as many use cases as possible to leverage GenAI. How can security leaders support and enable the digital processes, interactions and transactions that drive their business? By establishing a secure, modern governance framework that protects high quality data throughout its lifecycle.
Join this session to discuss:
- How to align security objectives with data governance principles
- Strategies to ensure availability, integrity and confidentiality in data while mitigating risks for the long term
- The importance of complying with data-focused regulations while creating value from a data governance framework
Cyber Resilience— Beyond the Breach
Organizations face complex threats that can overwhelm defenses and expose critical assets. Cyber resiliency helps organizations withstand and recover from attacks, while compliance regulations further strengthen security. Are you ready to boost your organization’s cyber resilience?
Join this session to explore:
- Strategies for minimizing attack surfaces
- Methods for securing critical IT assets
- Insights on leveraging compliance for stronger security
User Access—Leveraging the Right Technologies
The path to a stronger IAM strategy lies within an agile digital system. CISOs are often challenged with keeping an entire company up to date, as well as identity-related breaches and core business operations being interrupted - but easy to use technology (when leveraged correctly) can be a game changer.
Join this boardroom to discuss:
- What the essentials are for building an efficient IAM system
- The challenges faced when protecting remote workers’ environments
- Optimizing user experience when adopting a user access program
From Technologist to Trusted Business Leader
As the role evolves, CISOs no longer want to be seen as technologists but as essential business leaders who happen to be tech savvy. In this newly defined role, how are you demonstrating your understanding of business priorities and gaining trust and support from stakeholders as you outline an infosec strategy that enables the enterprise?
Join your peers to discuss:
- Balancing a sense of urgency with due diligence
- Building a team with the right blend of technology and business skills
- Cultivating persuasive leadership
Looking to the Future — What's Next and Where Will We Get Left Behind?
As we look toward 2026 and 2027, the futurist landscape extends beyond AI, with breakthroughs in areas like synthetic biology, quantum computing, and climate adaptation reshaping business possibilities. However, we’ve given less thought to challenges such as ethical governance, psychological impacts of technology, and the resilience of global supply chains. To stay ahead, organizations must expand their foresight, anticipate overlooked trends, and foster adaptability. By thinking broadly and planning proactively, businesses can better navigate uncertainty and seize emerging opportunities.
Join this discussion to:
- Identify underexplored trends and technologies that could disrupt your industry in the next 2-3 years
- Learn strategies for building organizational resilience and adaptability amid rapid change
- Explore actionable foresight tools to future-proof your business across operations, talent, and innovation
Should CISOs be Responsible for Business Continuity?
While incident response, business continuity, and disaster recovery are unquestionably linked, each is a separate initiative with its own distinct objectives. While it makes sense for CISOs to own IR, business continuity is increasingly also finding its way onto CISOs' already overloaded plates -- but is that where it should be? Since so much of BCP is tied to the service impacts on the organization such as financial, reputation, etc. as CISO do you feel you have sufficient qualifications/expertise to address?
Join your peers for a thought-provoking discussion about:
- Where business continuity should optimally sit in the organization
- What CISOs with BCP under their purview are doing to manage it
- How CISOs are navigating BCP challenges whether they're responsible for it or not
Navigating Burnout, Embracing the Unexpected, and Charting Life After CISO
Often referred to as the “thankless job,” CISOs are at the forefront of managing complex threats and safeguarding organizational assets. The relentless pressures and demands of the role can lead to burnout, causing many to question their future beyond the CISO position. However, by focusing on well-being and exploring new opportunities, CISOs can sustain their resilience, envision fulfilling career paths, and continue making meaningful contributions. How can CISOs begin to gain insights into maintaining well-being and charting a rewarding path after their tenure?
Join this session to:
- Identify the symptoms and causes of burnout specific to CISOs and learn strategies for resilience and self-care
- Explore proactive measures for anticipating and managing unexpected cybersecurity crises
- Discuss potential career pathways and opportunities for leveraging CISO experience in diverse roles beyond cybersecurity leadership
Penalty Boxes & Power Plays—Navigating Strategies for Holding Users Accountable
In the high-stakes game of cybersecurity, every user is a player whose actions impact the entire enterprise’s defense. But how do you deal with players whose behavior exposes your organization to heightened risk—either by repeatedly failing phishing tests, disregarding policies, or simply due to the nature of their work?
This roundtable brings together security leaders to candidly discuss strategies for user accountability, including:
- Debating the efficacy of current interventions for your highest-risk users
- Balancing accountability and empathy when addressing these users, especially when your authority to penalize is limited
- Exploring the viability of innovative ideas for moving beyond the "penalty box" to truly change behavior and strengthen our security posture
Keynote Sessions
Brain-Driven Resilience—Neuro-Optimizing for Executive Edge
In the high-stakes arena of billion-dollar enterprises, resilience isn't just an asset; it's a necessity. Learn how elite athletes, Navy SEALs, and top executives leverage cutting-edge neuroscience and cognitive training to elevate their relationship with adversity to yield more resilient outcomes. Cognitive training can help boost executive function and enhance decision making under pressure.
Join Megs Gelfgot, Tedx speaker and two-time founder, as she shares:
- Hacks for gaining a competitive edge
- Tactical resilience leadership strategies
- Ways to mitigate symptoms of cognitive decline
Zero Trust & AI—Strengthening Security, Reducing Complexity, and Driving Innovation
Businesses stand to benefit from AI in unprecedented ways, but only if security leaders overcome transformation challenges. This includes implementing a modern zero trust architecture to protect data and users, embracing AI while managing its risks, and handling the technical and financial implications of ever-expanding environments. A risk-based approach to security ensures CISOs deliver a secure, phased transformation.
Join this session to:
- Understand how zero trust and AI together, unlike firewalls, provide the strongest cyber defense by stopping threat actors from lateral movement within networks
- Learn strategies for protecting AI applications developed in data centers and the cloud, while preventing data leaks from public AI applications
- Discover how eliminating costly legacy hardware simplifies environments while cutting network and security costs
Beyond Technical Excellence—How Emotional Intelligence Transforms Cybersecurity Effectiveness
Perfectly competent technical teams falling apart under pressure. Stakeholder communications that create more problems than they solve. Incident responses where human factors turn manageable situations into organizational nightmares. Every CISO has seen or lived through each of these scenarios—and likely more than once.
As an industry, we've spent decades building amazing technical capabilities while ignoring the human elements that determine success or failure in critical moments. After 30+ years of battle-tested experience in the cybersecurity trenches, CISO Jamie Giroux realized that a new approach was needed to transform his security operations teams from merely technically competent to strategically exceptional.
In this keynote, Giroux shares his elements of his game-changing framework specifically engineered to integrate emotional intelligence (EQ) with cybersecurity operations, including:
- Why teams with higher emotional intelligence consistently outperform technically superior teams during actual incidents
- What concrete steps for building EQ capabilities within existing security frameworks and operational constraints actually work
- How organizations are achieving 15-25% improvements in key security metrics through human performance optimization
Breakout Sessions
Better Together—Internal Audit and Cybersecurity
Traditionally, the relationship between audit and cybersecurity teams has been marked by a degree of tension—each function operating with distinct objectives, priorities, and perspectives. However, as cyber threats evolve and regulatory pressures mount, CISOs have a unique opportunity to transform this dynamic into a strategic partnership.
Join this session to:
- Learn how integrated approaches to controls testing, vulnerability management, and incident response can uncover blind spots, streamline compliance, and drive continuous improvement
- Talk through real-world examples of successful partnerships, common challenges, and actionable strategies for fostering trust and communication between these critical functions
- Discover how aligning audit and cybersecurity not only strengthens defenses, but also delivers greater value to the business
Navigating the Risks vs. Rewards of GenAI
As organizations continue to race to unlock business value from GenAI, information security leaders are tasked with navigating a complex landscape — balancing the promise of innovation with concerns about data integrity, trustworthiness, and operational risk.
Join this session to hear a candid conversation between cybersecurity leaders about their experiences — and concerns — with leveraging AI’s opportunities and mitigating its risks in the context of enterprise cybersecurity, including:
- Establishing effective governance frameworks
- Fostering a culture of responsible AI use and adoption
- Ensuring that the drive for business innovation doesn't compromise cybersecurity
Next-Level Security Transformation—Engaging Boards, the Business, and Beyond
In today’s complex threat landscape, transforming an enterprise into a truly security-aware organization requires more than technical solutions—it demands a shift in business mindset and culture at every level, including the ELT and board.
Join this session to hear from your CISO peers as they share:
- Proven methods for engaging executive leadership and the board, ensuring security is aligned with overall business objectives and decision-making
- Practical approaches to foster security awareness beyond compliance and technical controls, emphasizing the roles of people, process, and governance
- Real-world experiences leading a cultural transformation, making security an integral part of enterprise strategy and daily operations
Apply to Participate
Apply to participate in the Toronto CISO Community Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
Location
Venue & Accommodation
Marriott Downtown at CF Toronto Eaton CentreA block of rooms has been reserved at the Marriott Downtown at CF Toronto Eaton Centre at a reduced conference rate. Reservations should be made online or by calling 800-905-0667 . Please mention Toronto Executive Summit to ensure the appropriate room rate.
Deadline to book using the discounted room rate of $289 CAD (plus tax) is October 30, 2025.
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.