In-Person

Toronto CISO Community

Executive Summit

June 24, 2026 | Marriott Downtown at CF Toronto Eaton Centre

June 24, 2026
Marriott Downtown at CF Toronto Eaton Centre

Collaborate with your peers

Get together with Toronto's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Navigating GenAI innovation with sensible governance

Streamlining access management and controls across both traditional and non-human identities

Reframing risk reduction as minimizing business impact and improving resilience

Toronto CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.

Governing Body Co-Chairs

Sandra Liepkalns

Choice Properties REIT
VP, Information Security & Data Governance

Ragulan Sinnarajah

Empire Company Limited
VP, CISO

Olivera Zatezalo

Ontario Power Generation
CISO & VP, Cyber and IT Security

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Toronto CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda

June 24, 2026

8:00am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Into the Breach — Lessons From the Front Lines

Craig Newell headshot

Craig Newell

VP, Enterprise Information Security / Interim CIO

GDI Integrated Facility Services

Kush Sharma headshot

Kush Sharma

Inaugural CISO & Head of Infrastructure

City of Hamilton

Breaches are inevitable, impacts are escalating, and the expectations placed on security leadership have never been higher. Strengthening resilience requires not only mastering the technical response but also shaping organizational culture, guiding cross‑functional alignment, and communicating with clarity under pressure.

Join this session for:

  • Proven strategies CISOs use to manage, contain, and communicate during major breaches
  • Leadership behaviors that strengthen organizational confidence and crisis performance
  • Practical lessons teams can apply immediately to improve resilience and reduce future risk

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Securing the Agentic Workforce

Chad Skipper headshot

Chad Skipper

Global Security Technologist

Cisco Secure

As AI agents move from passive tools to active workforce members, CISOs face new governance and security challenges. The risks of rapid, autonomous action are real—but so are the opportunities for transformation. This session offers a practical, forward-looking approach to securely unlocking the value of agents.

Join this session to explore:

  • Reining in shadow agents
  • Protecting agents from malicious context
  • Protecting your business from rogue agents

9:40am - 10:25am  Executive Boardroom

Unifying Data Visibility — The AI Advantage for CISOs

Jeff Reichard headshot

Jeff Reichard

VP of Product Strategy

Veeam

Maneesh Agnihotri headshot

Maneesh Agnihotri

CISO

City of Toronto

CISOs are challenged by fragmented data landscapes, shadow IT, and the need for real-time visibility into sensitive information across different data estates including SaaS, cloud, and modern virtualization platforms. Manual discovery and governance processes can’t keep pace with today’s data sprawl, increasing risk and compliance exposure. Leveraging AI-driven data intelligence empowers CISOs to unify visibility, automate governance, and strengthen security posture.

Join this session to explore:

  • Automating sensitive data discovery across environments
  • Enabling continuous governance with AI insights
  • Reducing risk through unified data intelligence

9:40am - 10:25am  Executive Boardroom

The AI Mandate — Secure Innovation. Optimize Defense.

Steve Vintz headshot

Steve Vintz

Co-CEO

Tenable

AI is driving rapid business innovation while equally empowering threat actors, creating a dual mandate for today’s CISOs: securely enabling AI adoption and leveraging AI to enhance their own defensive capabilities. Securing this expanding AI attack surface requires strong visibility, holistic governance, and continuous policy enforcement. At the same time, effective defense at AI speed relies on GenAI for sharper insights and agentic AI to automate operations and outpace adversaries.

Join your peers to tackle critical questions on how:

  • AI adoption must be both empowered and governed to prevent new business and security risks
  • Visibility, governance, and continuous policy enforcement form the foundation of AI risk management
  • Combining GenAI insights with agentic AI automation is essential to operate—and defend—at machine speed

10:25am - 11:10am  Networking Break

10:35am - 11:00am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:10am - 11:55am  Breakout Session

Rethinking Security for Agentic AI — From Control to Orchestration

As AI agents start acting across business environments, data becomes the true control surface. These agents require broad access to data, identities, and business processes, creating new risk patterns as sensitive data and outbound actions converge at machine speed. This is a control shift. CISOs must modernize their data approach to adopt agentic AI confidently while maintaining oversight.

Join this session to explore how to:

  • Detect emerging risk behaviors in autonomous AI
  • Build a data-centric and intent-aware security model
  • Establish the CISO as the orchestrator of scalable AI and business growth enabler

11:10am - 11:55am  Breakout Session

Identity-Aware Resilience — Control, Recovery and Trust

Kiran Mangat headshot

Kiran Mangat

Director and Head, North America CXO Value Economics

Rubrik

Identity is the fastest path to disruption as attackers misuse valid access, expanding impact before traditional controls catch up. Prevention won't hold on its own. Organizations must contain the impact of compromise, limit the blast radius, and recover to a clean, trusted state across identities, data, and critical systems.

Join this session to explore how to:

  • Protect the identities that matter most to reduce business impact
  • Contain identity-driven incidents quickly before they spread across systems
  • Recover to a trusted state without reintroducing risk

11:10am - 11:55am  Executive Boardroom

Zero Trust as Culture, Not Just Control

Sylvester Abanseka headshot

Sylvester Abanseka

Sr. Manager, Information Security Assurance

Cloudflare

Zero Trust has evolved from a rigid security model to a user-friendly, business-aligned approach that is embedded in organizational culture. CISOs must clearly define and communicate Zero Trust’s direction, ensuring it is operationalized and embraced across business units.

Join this boardroom to discuss:

  • Articulating a modern, business-centric Zero Trust mandate
  • Embedding Zero Trust principles into daily operations and culture
  • Engaging stakeholders to champion Zero Trust as the organizational norm

11:10am - 11:55am  Executive Boardroom

Empowering Innovation While Strengthening Security and Control

As browser-based and unapproved applications reshape the future of work, CISOs face growing security and compliance risks, including data leakage and policy gaps. Proactively addressing these threats with effective safeguards protects enterprise data, supports innovation, and ensures resilience in an evolving workplace.

Join this session to discuss:

  • Risks from unmanaged and shadow tools
  • Policies to safeguard sensitive data
  • Maintaining compliance and robust security controls

11:55am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

AI Authority Drift — Closing the Governance Gap

Damian Chung headshot

Damian Chung

VP, Cyber Defense

Netskope

Artificial intelligence is entering a new phase. No longer limited to generating insights, modern AI systems are beginning to act — initiating workflows, interacting with applications, and making decisions at machine speed. As agentic AI systems become operational participants inside enterprise environments, this session explores how enterprises can safely scale AI by establishing governance across identity, authority, behavior, and data, while enabling innovation without introducing unmanaged risk.

Attendees will learn:

  • How to control the authority, behavior, and data access of autonomous systems operating across complex digital ecosystems
  • The emerging governance model, enacted through a real-time control plane, to address authority drift, misconfigured permissions, and unintended AI behavior
  • A practical framework and architecture for governing AI at enterprise scale

1:05pm - 1:30pm  Break

1:30pm - 2:15pm  Breakout Session

Securing the Rise of AI Identities

Henrique Teixeira headshot

Henrique Teixeira

Senior Vice President of Strategy

Saviynt

According to the International Data Corporation, the number of AI identities is expected to reach 1.3 billion in just two years. Yet many organizations don’t secure AI identities effectively, granting excessive access and relying on outdated, slow processes.

Join this session to learn how to:

  • Identify gaps in agent access visibility, ownership, and governance
  • Address the unique challenges of identity security in AI environments
  • Build scalable identity foundations to enable innovation and efficiency

1:30pm - 2:15pm  Breakout Session

The Power of a Perfect Decoy

Shawn McBurnie headshot

Shawn McBurnie

Head of IT, OT Security and Compliance

Northland Power

As cyber threats grow more sophisticated, organizations need detection strategies that identify attackers inside the network before damage occurs. What if a deliberately placed internal network lure could expose malicious behavior the moment an intruder begins to explore? 

Join your peers to discuss:

  •  How internal network lures create warning signals that complement existing security controls and provide insights into active threats
  • Key design considerations for building effective decoy assets that attract malicious activity
  • Practical lessons learned from  in-house development, including visibility gains and operational impacts

1:30pm - 2:15pm  Executive Boardroom

Supply Chain Dependencies — Have You Checked Your Blind Spot?

Tony Anscombe headshot

Tony Anscombe

Chief Evangelist Officer

ESET

As organizations grow more digitally interconnected, supply chains have become one of the most attractive and disruptive cyber targets. Third‑party breaches can halt operations, cascade across partners, and rapidly transform technical incidents into business and financial crises. Understanding and managing supply chain dependencies is now a core resilience and risk management requirement.

Join your peers to discuss:

  • Why third‑party cyber risk is now a business continuity issue, not just a security concern
  • How to map critical digital and non‑digital supply chain dependencies to uncover hidden risk
  • What resilience strategies organizations need to withstand supplier‑driven cyber disruptions

1:30pm - 2:15pm  Executive Boardroom

Identity Fabric Foundations for True Zero Trust

Mike Berthold headshot

Mike Berthold

Senior Solutions Architect, Office of the Field CTO

Okta

For CISOs, Zero Trust has long been the strategic objective—but least privilege remains largely theoretical. AI and machine identities are quietly outpacing human‑centric controls, reshaping the enterprise risk landscape.Traditional security models were not designed for this reality. To regain control, organizations must move beyond static permissions and adopt an Identity Fabric capable of enforcing Zero Standing Privilege across every identity—human and machine—at enterprise scale.

Join your peers to discuss:

  • Extending Zero Trust to govern human, machine, and AI identities end‑to‑end
  • Replacing standing privileges with just‑in‑time access through architecture, not process
  • Using an Identity Fabric to enable visibility, control, and business agility at scale

2:15pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Sandboxes, Scale, and Secure Cloud Speed

Rajat Sood headshot

Rajat Sood

Deputy CISO, Head of Americas

Capco

Good cybersecurity governance gives CISOs the structure and authority needed to align security decisions with business priorities while maintaining clear accountability across teams. With consistent policies, defined ownership, and transparent measurement, CISOs can act with confidence, manage risk proactively, and sustain resilience as threats evolve.

Join you peers to uncover:

  • Clear accountability that defines who owns decisions and outcomes
  • Standardized, repeatable processes that guide consistent security execution
  • Transparent reporting that translates risk into actionable business insight

3:00pm - 3:45pm  Executive Boardroom

The C‑Suite Translator – Turning Cyber Speak Into Boardroom Gold

Raghu Kumar headshot

Raghu Kumar

AVP CSOC Detection and Response & Application Security

Hudson's Bay

Paul Min headshot

Paul Min

VP, Technology Operations & Security

Cadillac Fairview

How can CISOs elevate cybersecurity from a technical sidebar to a strategic powerhouse that commands executive attention? This message challenges leaders to transform complex cyber concepts into clear, compelling business value—bridging the gap between security operations and organizational growth. By reframing cybersecurity as a driver of resilience, revenue protection, and competitive advantage, CISOs can turn every boardroom conversation into an opportunity for influence.

Join your peers to discuss:

  • Translating risk into business‑aligned outcomes that resonate with executive priorities
  • Using narrative and clear decision paths to turn updates into meaningful context leadership can act on
  • Positioning cybersecurity as a strategic enabler that fuels trust, innovation, and long‑term performance

3:45pm - 4:00pm  Networking Break

4:00pm - 4:35pm  Keynote

Eliminating Stress and Burnout – A Symphony for Success

Julian Reeve headshot

Julian Reeve

Burnout Specialist, Former Music Director of Hamilton

Guest Speaker

Julian Reeve, former Music Director of the Broadway musical Hamilton, has spent a lifetime chasing results. On and off Broadway, his achievements have been applauded, conducted by ambition, and underscored by self-criticism. But a major life event demanded a change of tune. Now, as a noted authority on burnout and perfectionism, he offers concrete tools on how to build a burnout-free culture, retain high achievers and optimize self-care and performance for you and your team. Reeve is an Advisory Board Member for HR.com’s Research Institute, and his work has been featured in The Hill Newspaper and Fast Company/CEO World Magazines in addition to his TEDx Talk and children's book.

Join Reeve as he explores:

  • Recognizing and managing stress and burnout in yourself and your team
  • Identifying six keys to burnout control & avoidance
  • Clarifying individual vs. organization burnout responsibility

4:35pm - 4:45pm  Closing Comments and Prize Drawing

4:45pm - 6:00pm  Governing Body Reception

Governing Body Reception

Finish the day sharing lessons learned with your peers over light fare and drinks at this closing reception hosted by your governing body members.

June 24, 2026

We look forward to seeing you at an upcoming in-person gathering

Gartner cares about the health and safety of our community. If you are feeling unwell, please refrain from attending the conference. At this time, Gartner does not have any health-related requirements in place for attendance. Should this change, we will follow up with updated guidance.

Location

More Information

A block of rooms has been reserved at the Marriott Downtown at CF Toronto Eaton Centre at a reduced conference rate. Reservations should be made online or by calling 1 800 905 0667. Please mention Gartner Executive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $470 CAD (plus tax) is June 1, 2026.

Your Community Sponsors

Global Thought Leaders

CISO Thought Leaders

Key Sponsors

Program Sponsors

Community Program Manager

For inquiries related to this community, please reach out to your dedicated contact.

Lynn Morrow

Senior Community Program Manager

503-805-5624

lynn.morrow@gartner.com