googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Monday, April 7, 2025
    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0
    • session level icon
    speaker photo
    Cyber Risk Analyst, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

     

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

  • Tuesday, April 8, 2025
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:15 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Breakfast Roundtable (VIP / Invite Only)
    • session level icon
    The Responsible Vulnerability Disclosure – Beyond Bug Bounties
    speaker photo
    Toronto Police Service, Cybercrime Unit (Ret.); Founder, KONCYBER & RB-Cyber Assurance; RCMP Contractor/Instructor
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    This session is for SecureWorld Advisory Council members only.

    As the cybersecurity landscape evolves, the complexity of responsibly disclosing vulnerabilities has extended far beyond traditional bug bounty programs. The stakes are high: improperly handled disclosures can lead to data breaches, reputational damage, and exploitation by malicious actors. This interactive roundtable discussion brings together leading cybersecurity professionals, policymakers, and technology executives to explore the multifaceted challenges and opportunities in modern vulnerability disclosure practices.

    This roundtable encourages an open, collaborative dialogue, with attendees sharing actionable insights into creating more effective and ethical vulnerability disclosure programs. Be prepared to leave with a deeper understanding of best practices, innovative strategies, and emerging trends that can help your organizations navigate the complexities of responsible vulnerability disclosure in an interconnected digital world.

    Join us for this critical conversation and be part of shaping the future of vulnerability management beyond the bug bounty.

    8:00 am
    Association Chapter Meetings
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Participating professional associations and details to be announced.

    8:00 am
    Are You in a Dysfunctional Relationship with the HR Department?
    • session level icon
    speaker photo
    Executive Director, National Cybersecurity Alliance
    Registration Level:
    • session level iconConference Pass
    8:00 am - 8:45 am

    When HR and security teams understand their respective roles, value each other, and have an open, productive partnership, life is good. They can help each other be more effective and complement each other’s functions. Unfortunately, that symbiotic state can be hard to achieve. For security teams, HR folks can be hard to understand. Sometimes they seem like a great advocate for security, and at other times they can seem more like a blocker of our efforts to better secure the organization.

    For HR professionals, dealing with the security team can be a challenge. For example, the security team might send out an emotionally-triggering simulated phish to everyone in the organization, causing numerous employee complaints that HR has to manage. So what can you do if you don’t have the best relationship with the HR team?

    This talk, based on years of experience navigating the relationship between HR and security teams, will cover the issues that cause the biggest disconnects between HR and security. We’ll look at the issues from both sides and cover proposed solutions for each. Improving the relationships for both departments can lead to happier HR and security professionals who are more effective in their roles, and a company that’s better protected and prepared against cyber threats.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] Why Your Security Team's Structure Is the Biggest Vulnerability
    • session level icon
    The Future of Cross-Functional Training
    speaker photo
    CISO, Ruby; Co-Host, Bare Knuckles & Brass Tacks Podcast
    speaker photo
    Co-Host, Bare Knuckles & Brass Tacks Podcast
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    Today’s cybersecurity teams are increasingly brittle. Organized around human specialization and siloed expertise, today’s teams can’t seize the advantage with new AI-powered tooling. Drawing from military operations and elite sports, this keynote introduces a new paradigm for organizing cross-functional and interdisciplinary cyber defense teams. By breaking down traditional role boundaries, organizations can forge adaptive teams that think faster, respond quicker, and innovate better.

    This session will explore how cross-functional teams offer three key advantages:

    • Enhanced Agility: Cross-trained personnel can quickly pivot to address emerging threats, eliminating bottlenecks caused by over-specialization.
    • Improved AI Integration: Teams with diverse skill sets are better equipped to understand, implement, and derive value from AI-driven security tools.
    • Cognitive Diversity: Blending perspectives from various security disciplines fosters creative problem-solving and more comprehensive threat analysis.
    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    [Panel] Mental Health vs. Mental Wellbeing: How to Cultivate Resilient Security Teams
    • session level icon
    speaker photo
    Founder & Director, MindShield Institute
    speaker photo
    COO, iON United Inc.
    speaker photo
    Sr. Manager, Information Security, TD
    speaker photo
    CSO, CDW Canada
    speaker photo
    Co-Founder, Mind Over Cyber
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    This panel discussion confronts the challenge of building InfoSec teams with the skills to manage stress under pressure. Cybersecurity executive leaders explore how to create team cultures, practices, and processes for proactively building mental well-being instead of addressing mental health from a reactive position. Much like building a security program, the group looks at the role mindfulness can play in helping defenders increase job satisfaction, improve focus, and lower the risk of burnout. Attendees can expect to gain actionable insights and practical steps that can be implemented within their organizations to cultivate this type of resilience.

    10:15 am
    [Panel] What's Next in AI/ML and Shadow IT: Opportunities and Challenges for CISOs
    • session level icon
    speaker photo
    VP, IT & Security, Wolf Advanced Technology
    speaker photo
    VP, Information Security, Moneris Solutions
    speaker photo
    VP, Cybersecurity & Technology, Computek College; Special Advisor, Cybersecurity & ICT Initiatives, 369 Global
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    The rapid adoption of artificial intelligence (AI) and machine learning (ML) technologies is revolutionizing businesses across industries—but it’s also creating new challenges for CISOs and their cybersecurity teams. Compounding the issue is the surge in Shadow IT, where employees adopt unauthorized tools and applications, often powered by AI/ML, to boost productivity. This convergence of trends creates a double-edged sword: while AI/ML offers unprecedented opportunities to strengthen security and drive innovation, it also introduces significant risks. This forward-looking session explores:

    • Emerging Trends in AI/ML Adoption: How organizations are leveraging AI/ML to improve efficiency and security, and what new use cases are on the horizon.
    • The Shadow IT Explosion: How unsanctioned AI/ML tools bypass security controls, introducing vulnerabilities and compliance challenges.
    • Implications for CISOs: The evolving role of CISOs in managing the risks and rewards of AI/ML and Shadow IT while maintaining visibility across sprawling tech ecosystems.
    • Balancing Innovation and Security: Strategies for enabling AI/ML adoption responsibly while minimizing risk from Shadow IT practices.
    • What’s Next: Predictions for how AI/ML technologies and Shadow IT will shape the future of cybersecurity programs.

    Attendees walk away with actionable insights into how to stay ahead of the curve as AI/ML adoption accelerates and Shadow IT continues to grow. Whether you’re a CISO, security practitioner, or IT leader, this session prepares you to navigate the opportunities and risks of this rapidly evolving landscape.

    10:15 am
    Unifying AI-Powered Threat Intelligence and SIEM
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    Session description to come.

    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    Building Human Firewalls: Fortifying Your Organization's Security Culture
    • session level icon
    speaker photo
    Principal Cybersecurity Advisor, 1SEC Solutions Inc
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    The human element is both the greatest vulnerability and the most powerful defense in cybersecurity. This interactive session aims to transform security awareness from a mere compliance checkbox into an integral part of your organizational DNA. Through engaging activities, including games, quizzes, and real-world scenarios, participants will learn how to identify risks, spot deepfakes, adopt secure behaviors, and foster a culture of accountability. Compete for awards and leave empowered to become a critical line of defense against cyber threats.

    11:10 am
    Soft Skills: The Hidden Key to Cybersecurity Success
    • session level icon
    speaker photo
    Cybersecurity Architect and Evangelist
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    Technical skills are vital in cybersecurity, but soft skills; communication, empathy, adaptability, collaboration – are keys to true success. This session explores how mastering these abilities bridges gaps between technical and business professionals and enhances teamwork. Learn practical techniques through real-world examples to develop these competencies and see how they amplify your impact.

    11:10 am
    Securing the Future: How Data Resilience and New Solutions Protect Your Assets
    • session level icon
    speaker photo
    Sr. Systems Engineer, Veeam
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

     In this session, we will explore the current state of security, the critical importance of Data Resilience, and how new solutions can help ensure your data remains protected and recoverable. Join us to understand why Data Resilience is essential in today’s digital landscape and how to implement it effectively— complete with real-world examples and case studies.

    12:00 pm
    [Lunch Keynote] Paving the Future of AI with Trust and Transparency
    • session level icon
    speaker photo
    Director of Secure Software Supply Chains and Secure Development, SAP
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    As AI reshapes industries, ensuring trust and transparency is essential to drive secure innovation. This keynote explores the latest AI trends, key security challenges, and the importance of safeguarding AI supply chains. It will also delves into designing resilient agentic AI systems to address evolving risks and foster responsible growth. Prepare to leave with practical strategies to secure the future of AI while maintaining innovation at scale.

    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite only)
    • session level icon
    Securing Toronto and Beyond: Lessons in Leadership from Top CISOs
    speaker photo
    Executive Director, National Cybersecurity Alliance
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    The role of the CISO continues to evolve as cybersecurity leaders work to shape business resilience and protect critical assets. In this invite-only roundtable discussion for Advisory Council members and select VIPs, top CISOs from the Toronto region and beyond come together to share their hard-earned insights, leadership strategies, and lessons learned from defending some of the largest and most influential organizations.

    This engaging discussion explores topics such as navigating boardroom conversations, driving a culture of security across the enterprise, and adapting to emerging threats while enabling business growth. Come prepared to inspire each other and share actionable advice and strategic takeaways.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    From Manual to Mastery: How GRC Automation Can Elevate Business Efficiency
    • session level icon
    speaker photo
    Director of GRC, GlobalVision
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm

    Small and medium-sized businesses (SMBs) face more and more challenges in managing GRC functions amid the fast-evolving regulatory, cyber threat, data privacy, and general risks landscape. SMBs are usually limited by smaller teams and limited funds, which makes manual processes ineffective and error prone. In contrast, major organizations frequently have specialized staff to perform these duties. The SMBs search for a solution to efficiently handle GRC functions without taxing resources or spending excessive amounts of money as cybersecurity threats and regulatory demands increase. As regulatory demands are always growing and cybersecurity threats constantly evolve, SMBs are searching for ways to manage GRC functions effectively without straining resources or spending too much dollars. This session goes through a case study of an SMB that successfully transitioned from manual GRC processes to a fully automated system. Through the adoption of GRC automation, the company streamlined its risk management program, reduced human errors, and aligned more easily with highly regulated clients, thus supporting its long-term growth and creating a scalable compliance framework for the future.

    1:15 pm
    Beyond Questionnaires: Innovative Approaches to Earning Customer Trust
    • session level icon
    speaker photo
    CISO, C&R Software
    speaker photo
    Director, Information Security, GRC, C&R Software
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm

    Supply chain risk has become a critical concern for organizations worldwide, with vendors facing pressure to demonstrate reasonable cyber assurance. In the past, a simple questionnaire with yes/no answers was often sufficient to address these concerns. However, the landscape has shifted due to increased regulatory scrutiny and high-profile data breaches, significantly raising the bar around due diligence.

    This session explores the evolving expectations in supply chain risk from a vendor perspective and provide valuable insights into best practices for:

    • Crafting comprehensive questionnaire responses
    • Developing and maintaining effective customer trust portals
    • Leveraging third-party reports to enhance credibility
    • Successfully navigating client audits

    The presenters will share practical strategies to help organizations meet the standards of cyber assurance and enhancing trust with customers. Attendees will gain actionable insights to strengthen their risk management processes and better align with latest stringent requirements.

     

    1:15 pm
    [Panel] The Sorcerer's Apprentice: Taming AI in Cybersecurity
    • session level icon
    speaker photo
    Senior Director of Product Management, Cyberhaven
    speaker photo
    Sr. Threat Intel Product Marketing Manager, Infoblox
    speaker photo
    Vendor Risk Manager, Manulife
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    AI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.

    2:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:10 pm
    [Panel] Crisis Ready: Mastering Incident Response, Disaster Recovery, and Business Continuity
    • session level icon
    speaker photo
    IT Director & CISO, Maple Reinders Group
    speaker photo
    Cybersecurity Architect and Evangelist
    speaker photo
    Director, IAM, IGM Financial
    speaker photo
    Principal Cybersecurity Advisor, 1SEC Solutions Inc
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    This panel session explores how organizations can effectively integrate incident response playbooks, disaster recovery (DR) strategies, and business continuity (BC) planning to build resilience against disruptions. The discussion focuses on best practices, lessons learned, and actionable insights for ensuring operational stability during crises.

    2:10 pm
    Future-Proofing the Cybersecurity Workforce
    • session level icon
    Closing Skill Gaps through Internal Development and External Partnerships
    speaker photo
    Sr. Manager, Enterprise Security Education, Bank of Montreal
    speaker photo
    Professor, Seneca Polytechnic; Technical Counselor, Security & Privacy Practice, Info-Tech Research Group
    speaker photo
    VP & Treasurer, ISC2 Toronto Chapter; Director, Security Program Management, Security Compass
    speaker photo
    President, ISC2 Toronto Chapter; Sr. Manager, Technology Risk Management, Manulife
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    This panel brings together industry leaders to explore practical strategies for bridging skill gaps through internal training, career development, and external partnerships with academia, government, and industry. The panel covers the following discussion topics:

    1. Upskilling and Career Pathways – How organizations can develop cybersecurity talent through structured training, mentorship, job rotation, job shadowing, short-term gigs in other teams, and career progression.
    2. Strategic Partnerships – The role of academia, apprenticeships, and industry collaborations in expanding the talent pipeline.
    3. Evolving Skill Demands – The increasing need for automation, critical thinking, collaboration, and other technical and soft skills in cybersecurity.
    4. Retention & Growth – Strategies to engage and retain cybersecurity professionals through career development, leadership opportunities, and workplace culture.

    Attendees will gain actionable insights on building a resilient cybersecurity workforce by combining internal development with external partnerships to meet evolving industry needs.

    2:10 pm
    Making the Financial Case for a Shared SOC
    • session level icon
    A Strategic Approach for Enterprise Executives
    speaker photo
    VP, Cybersecurity & Technology, Computek College; Special Advisor, Cybersecurity & ICT Initiatives, 369 Global
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm

    As cybersecurity threats continue to evolve, enterprises face increasing pressure to protect sensitive data, ensure operational continuity, and meet regulatory requirements. For many organizations, building an in-house Security Operations Center (SOC) is a daunting financial and logistical challenge. This presentation will focus on how executives can strategically sell the idea of a shared SOC, emphasizing its operational, financial, and risk mitigation benefits.

    We’ll discuss how a shared SOC can reduce costs, enhance threat detection, and streamline incident response across business units, all while optimizing resource allocation. Attendees will learn how this approach aligns with broader enterprise goals such as improving security posture, achieving compliance, and minimizing risk. This session will provide actionable insights on presenting a compelling business case for a shared SOC to senior leadership, ensuring alignment with strategic business objectives.

    2:55 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:55 pm - 3:15 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:15 pm
    [Closing Keynote] Emerging Cyber and Physical Security Threats
    • session level icon
    Navigating Quantum, AI, Personal Security, and Global Conflict
    speaker photo
    Partner and Head of Technology; Co-Chair of Data Protection, Privacy, and Cybersecurity, Norton Rose Fulbright Canada LLP
    speaker photo
    CISO, Technology & Transformation Command, Toronto Police Service
    speaker photo
    Principal Cryptographer, Director of Cloud Security Patterns and Policy-as-Code, Scotiabank
    speaker photo
    VP & CISO, Varicent
    speaker photo
    RCMP Officer in Charge, Cybercrime Investigative Team Toronto
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 4:00 pm
    Location / Room: Keynote Theater

    As technology rapidly evolves, cybersecurity professionals must prepare for emerging threats that could reshape the cyber landscape. Quantum computing looms as both a security disruptor and an opportunity, open-source AI is expanding the attack surface, geopolitical tensions are fueling state-sponsored cyber warfare, and executives are more and more at risk of physical violence due to policy decisions unrelated to cybersecurity. How can organizations anticipate and mitigate these risks before they escalate?

    This expert panel explores the intersection of cybersecurity and physical security, emerging technologies, and global conflict, providing insights into:

    • Quantum Computing: The timeline for quantum threats and how post-quantum cryptography is evolving.
    • Open-Source AI: The double-edged sword of AI-driven cyber threats and defense strategies.
    • Geopolitical Cyber Warfare: How nation-state conflicts are shaping the cyber threat landscape and what organizations can do to bolster resilience.
    • Risk Mitigation Strategies: Practical steps security leaders should take today to future-proof their defenses.
    • Managing Physical Threats: How organizations are keeping executives and rank-and-file employees safe.
    4:00 pm
    Cyber Pitch Battle Royale & Happy Hour
    • session level icon
    Open to all attendees; separate registration required
    speaker photo
    Co-Host, Bare Knuckles & Brass Tacks Podcast
    speaker photo
    CISO, Ruby; Co-Host, Bare Knuckles & Brass Tacks Podcast
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 6:00 pm
    Location / Room: Keynote Theater (Princes’ Gate Ballroom)

    Come join your fellow attendees for an exciting conclusion to the conference with a complimentary Happy Hour prior to a one-of-a-kind event.

    The Cyber Pitch Battle Royale reimagines how cybersecurity vendors and senior leaders connect. Brought to life by the hosts of the award-winning cybersecurity podcast, Bare Knuckles and Brass Tacks, this event combines their raw energy with the fun of a comedy roast. The result is an electric atmosphere where vendors brave the stage for five minutes before a crowd that’s encouraged to cheer innovation and jeer jargon. With a panel of five CISO judges and an audience of decision-makers from Canada’s leading organizations, contestants will compete for the Battle of Toronto Champion Belt in a format that strips away traditional corporate pretense. This breakthrough event promises to transform industry networking through authenticity, humor, and high-energy engagement. As one CISO put it, “I didn’t know what to expect, but it blew my expectations. I’d wanna do this again and again!”

    NOTE: You must register separately for the complimentary Happy Hour and Cyber Pitch Battle Royale; watch for that separate link to arrive in your conference registration confirmation email.

Exhibitors
  • Arctic Wolf Networks
    Booth: 180

    Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit  https://www.arcticwolf.com.

  • Anomali
    Booth: 170

    Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.

  • Canadian Cybersecurity Network (CCN)
    Booth: n/a

    Canada’s largest Cybersecurity Network, with more than 42,000 members. Providing services for individuals and companies across Canada. Connected to CanadianCybersecurityJobs.com, Canada’s largest and only dedicated cybersecurity jobs portal.

  • Cyberhaven
    Booth: 110

    When the DLP market first emerged 20 years ago, the goal was to protect confidential information in on-premises databases, file servers, application servers, other data repositories, and endpoints. Today millions of sensitive documents, files, and other data are being exfiltrated in violation of corporate data policies every day because DLP is completely ineffective in the era of cloud-first applications and Zero Trust security. These data breaches result in stolen IP, damaged brands, and significant financial penalties. Let’s face it, DLP in its current form is nothing more than a compliance checkbox. Cyberhaven is transforming the DLP market and helping organizations secure all of the high-value data they must protect in order to compete and thrive in the digital economy. It’s a big hairy problem, and we are up to the challenge.

  • Discern Security
    Booth: 150

    Discern Security utilizes generative AI to analyze and optimize security controls and policies, maps them to frameworks like MITRE, NIST, CIS, etc., performs security health checks, offers personalized recommendations, and provides reporting dashboards for actionable insights.

  • Infoblox
    Booth: 210

    Infoblox unites networking and security to deliver unmatched performance and protection for a world that never stops. By providing real-time visibility and control over who and what connects to the network, we use intelligent DNS and user context to stop threats other solutions will miss, enabling organizations to build safer, more resilient environments. We’re continually supporting more than 13,000 customers—including 92 of Fortune 100 companies, as well as emerging innovators—by building the brightest, most diverse teams and by thoughtfully engineering intelligent networking and security solutions for an increasingly distributed world.

  • ISC2 Toronto
    Booth: n/a

    Founded in 2013, the ISC2 Toronto Chapter is an official chapter of ISC2.  Based in Toronto, our purpose is to provide educational opportunities for management, operational and technical aspects of the information security field, and to support the mission of ISC2.

  • Leading Cyber Ladies – Toronto Chapter
    Booth: TBD

    Leading Cyber Ladies is a global non-profit organization who focuses on bringing more women into the cyber field through educational cybersecurity sessions, mentorship, speaking opportunities, networking and career opportunities through close partnership with the business sector and other groups in the cybersecurity community.

    While we are focusing on educating women, we are welcoming everyone, all genders and identities! Here we support each other in a friendly and encouraging environment. We are proud to partner with many sponsor companies across Toronto to bring our events to the community free of charge. Join our Meetup group for details on upcoming events!

    We are proud to partner with many sponsor companies across Toronto to bring our events to the community free of charge. Join our Meetup group for details on upcoming events!

    Learn more about LCL here: https://leadingcyberladies.com

  • One Identity
    Booth: 220

    One Identity, a Quest Software business, helps organizations achieve an identity-centric security strategy with a uniquely broad and integrated portfolio of identity management offerings developed with a cloud-first strategy including AD account lifecycle management, identity governance and administration, and privileged access management. One Identity empowers organizations to reach their full potential, unimpeded by security, yet safeguarded against threats without compromise regardless of how they choose to consume the services. One Identity and its approach is trusted by customers worldwide, where more than 7,500 organizations worldwide depend on One Identity solutions to manage more than 125 million identities, enhancing their agility and efficiency while securing access to their systems and data—on-prem, cloud, or hybrid.

  • ThreatLocker
    Booth: 120

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • Toronto IAM Community
    Booth: TBD

    This group is designed for individuals interested in Identity and Access Management (IAM) practices, strategies, and industry trends. Join us to network with like-minded professionals who are passionate about protecting digital identities and ensuring secure user access. Whether you are an IAM enthusiast, professional, or just curious about this evolving field, our meetups will provide opportunities to learn, discuss, and collaborate. Together, we aim to navigate the intricacies of IAM, share best practices, and stay up-to-date with the latest developments in identity security. Let’s safeguard digital identities in Toronto and beyond!

  • WiCyS Ontario Affiliate
    Booth: TBD

    Women in Cybersecurity (WiCyS) is an organization dedicated to bringing women in cybersecurity together to share knowledge and experience through networking, education and mentoring. The WiCyS Ontario, established in April 2019, is a community of Ontario women interested in cybersecurity.

    As the first Canadian Affiliate, our aim is to achieve gender parity for women in the cybersecurity field through outreach, awareness, networking, sharing, mentoring and engagement. As a WiCyS Affiliate, our group organizes activities and events which promote recruitment, retention and advancement of women in cybersecurity.

  • Veeam Software
    Booth: 100

    Veeam provides a single platform for modernizing backup, accelerating hybrid cloud and securing data. Veeam has 400,000+ customers worldwide, including 82% of the Fortune 500 and 69% of the Global 2,000. Veeam’s 100% channel ecosystem includes global partners, as well as HPE, NetApp, Cisco and Lenovo as exclusive resellers, and boasts more than 35K transacting partners worldwide.

    With offices in more than 30 countries and over 200 industry awards, Veeam is unquestionably the leader in data protection across all environments. In fact, Veeam has been positioned by Gartner, Inc. in the Leaders quadrant of the 2022 Magic Quadrant for Enterprise Backup and Recovery Solutions. Not only does this mark the sixth consecutive time Gartner has recognized Veeam as a Magic Quadrant Leader, but it is the third consecutive year Veeam is positioned highest overall in ability to execute.

  • VMRay
    Booth: 130

    At VMRay, our purpose is to liberate the world from undetectable digital threats.
    Led by reputable cyber security pioneers, we develop best-in-class technologies to help organizations distinguish genuine threats from the noise and obtain additional context and insights into those threats.
    Based on the world’s most advanced malware and phishing analysis platform, we enable enterprises, government organizations, and MSSPs to automate security operations, accelerate analysis and response, and build reliable threat intelligence. In times of uncertainty and complexity, we create room for clarity and productivity to help security teams thrive.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Rob Finch, Instructor
    Cyber Risk Analyst, Cyber Risk Opportunities LLC
  • speaker photo
    Kenrick Bagnall, Moderator
    Toronto Police Service, Cybercrime Unit (Ret.); Founder, KONCYBER & RB-Cyber Assurance; RCMP Contractor/Instructor

    Kenrick Bagnall has 17 years of law enforcement experience, the last eight of which were in the Coordinated Cyber Centre (C3) as a Cybercrime Investigator. Prior to law enforcement, he spent two decades working in the Information Technology industry primarily in the financial services sector. During this time, he spent twelve years in Bermuda where he was a Senior Network Analyst for the Bank of Butterfield, then an IT Manager for FLAG Telecom and then Senior Vice President of Information Technology for CAPITAL G Bank (now Clarien Bank) before returning to Canada in 2005. Kenrick is also a cybersecurity instructor, writer, and host of the KONCYBER podcast.

  • speaker photo
    Lisa Plaggemier
    Executive Director, National Cybersecurity Alliance

    Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.

  • speaker photo
    George Al-Koura
    CISO, Ruby; Co-Host, Bare Knuckles & Brass Tacks Podcast
  • speaker photo
    George Kamide
    Co-Host, Bare Knuckles & Brass Tacks Podcast
  • speaker photo
    Sumona Banerji
    Founder & Director, MindShield Institute

    Sumona Banerji is a futurist, cyber-psychology expert, and founder of MindShield Institute, a think-tank developing products that build emotional intelligence, cyber-resilience, and cognitive security. The goal is to mitigate risks to human cognition, connection, and security, in the face of exponential technology, through innovation in education, mental health, and ethical technology.

  • speaker photo
    Kevin Banks
    COO, iON United Inc.
  • speaker photo
    Farzia Khan
    Sr. Manager, Information Security, TD

    Farzia Khan is an award-winning tech leader, cybersecurity advocate, and champion of innovation. As the Senior Manager of Information Security at TD Bank, she has spearheaded enterprise-wide cyber resiliency initiatives, strengthening defences, raising awareness, and equipping colleagues and customers with the knowledge to navigate evolving cyber threats. Farzia’s career began when she was selected as one of the Top 30 female students to advise the CEO on the Future of Work at BMO, where she helped drive impactful technology initiatives.

    A passionate advocate for Women in STEM, she founded ElleHacks, Canada’s largest all-women hackathon, and Robocon, the first international hackathon focused on service robots. As the founder of NextGen Digital Defender, Farzia is dedicated to demystifying cybersecurity careers and empowering the next generation with cyber awareness through education, storytelling, and advocacy. She is also a children’s book author, using engaging narratives to teach kids about cyber safety and digital responsibility. Fluent in six languages, she provides free translation services for underprivileged immigrants and is deeply committed to supporting students from diverse backgrounds—actively mentoring aspiring technologists and having established a scholarship at her alma mater.

    Her contributions to STEM and cybersecurity have earned her prestigious accolades, including recognition as a Top 10 Under 40 in Canadian Security, Top Community Influencer, Top 30 Under 30 Changemaker, CILAR Aspiring Innovator Award winner and Women in Science & Engineering Champion.

  • speaker photo
    Daniel Pinsky
    CSO, CDW Canada

    Daniel is an accomplished cybersecurity professional with more than two decades of experience, serving diverse clients across North America and Europe across the financial, public, and technology sectors. His expertise encompasses technical roles and leadership positions, including leading the implementation and certification of essential security frameworks, such as PCI DSS, ISO 27001, and NIST CSF.

    Daniel holds the CSO position at CDW Canada and has the following certifications: CCISO, CISM, CISA, CRISC, and CISSP. He is committed to leadership, effective communication, and personal development. He shares insights through writing, public speaking, and mentoring others.

  • speaker photo
    George Kamide, Moderator
    Co-Founder, Mind Over Cyber
  • speaker photo
    Utpal Patel
    VP, IT & Security, Wolf Advanced Technology
  • speaker photo
    Vinay Puri
    VP, Information Security, Moneris Solutions

    Vinay is an ex-veteran and a leader in cybersecurity with two decades of experience. He possess incisive analytical skills and has innovative ideas to identify gaps in cybersecurity posture and has helped many organizations in architecting complete security frameworks. Vinay holds dual masters in Computer Science and Information Warfare from the United States Naval Postgraduate School and possesses niche certifications in the cyber space, which include ISSO, ISSM, ISSP, SABSA, ECSA, CEH, and CCNA.

  • speaker photo
    Ali Abbas Hirji
    VP, Cybersecurity & Technology, Computek College; Special Advisor, Cybersecurity & ICT Initiatives, 369 Global

    With more than 16 years in IT leadership, Ali specializes in Governance, Risk and Compliance (GRC), aligning with ISO 27001, NIST and SOC 2 to build secure and compliant infrastructures. His expertise spans IT security, risk management, and developing high-performing teams.

    In post-secondary education, he has taught at institutions across Canada, including Algoma University, Sheridan College, and York University, and served as Academic Chair for IT at the University of Fredericton. He also led the expansion of Durham College's Cybersecurity Innovation Center and established AI & Cybersecurity labs.

    His experience includes senior roles at ORION, managing connectivity projects and leading cybersecurity initiatives across Ontario, from tabletop exercises to keynotes at Graylog GO. As a strategic advisor at SiberX and VP of Cybersecurity and Technology at Computek College & 369 Global, he also led cyber training for Youth Employment Services, shaping talent through specialized programs.

  • speaker photo
    Anomali Representative
  • speaker photo
    Gennady Duchovich
    Principal Cybersecurity Advisor, 1SEC Solutions Inc

    Gennady Duchovich is an Information Security leader with more than two decades of experience in IT governance and security operations. His unique background combines military service with extensive industry expertise. Gennady specializes in driving transformation and adoption of next-generation cybersecurity solutions, aligning security policies with global standards. As a former Head of Cybersecurity at a Canadian bank and an active member of the Toronto CISO governing body, he inspires cultural change through leadership, peer influence, and by demonstrating tangible business value. Gennady is a frequent speaker at industry events, sharing insights on cybersecurity transformation and resilience.

  • speaker photo
    Evgeniy Kharam
    Cybersecurity Architect and Evangelist

    Evgeniy is built and wired differently. As a father of four, including twins, he has mastered the art of remaining unflappable in the face of adversity. His career, which began on the technical frontlines as a firewall deployment engineer, has evolved remarkably to a VP of Architecture at The Herjavec Group. This journey has provided him with a panoramic view of cybersecurity, showcasing his ability to navigate and lead across all its domains. Beyond his corporate achievements, Evgeniy's passion for the field extends to founding two podcasts—one technical Security Architecture, the other business-focused Cyebr Inspiration—and moderating panels and interviews for the industry. He uniquely blends his personal passions with his professional life by co-founding a cybersecurity-focused ski and snowboard conference, creatively merging lifestyle with industry engagement. Evgeniy now runs his own cyber/media consulting services, leveraging his extensive industry knowledge and media expertise to guide clients through the complexities of cybersecurity.

  • speaker photo
    Peter Stickle
    Sr. Systems Engineer, Veeam

    Peter Stickle is a Senior Systems Engineer at Veeam Software Canada, Inc., located in Ontario. With extensive expertise in Data Protection, Peter has been pivotal in advancing technical excellence and innovation within the organization, as well as with large commercial, public sector, and enterprise clients. Peter collaborates closely with customers and various teams to ensure seamless integration and optimal performance of Veeam's solutions, serving as a trusted advisor to clients.

  • speaker photo
    Helen Oakley
    Director of Secure Software Supply Chains and Secure Development, SAP

    Helen Oakley, CISSP, GPCS, GSTRT, is a cybersecurity leader driving standards for AI transparency and security. She co-leads key initiatives, including CISA.gov’s AIBOM and OWASP’s Agentic AI Security – threats and mitigations, shaping frameworks to address emerging risks in AI. As Director of Secure Software Supply Chains and Secure Development at SAP’s Global Security and Cloud Compliance, she defines and enforces security requirements and policies at every stage of development and across all technologies, ensuring robust protection, including in AI-driven systems. A Founding Partner of the AI Integrity and Safe Use Foundation (AISUF.org), Helen advises startups and speaks at major industry events, sharing practical insights to advance cybersecurity and AI innovation. She is also a co-founder of LeadingCyberLadies.com, a global network empowering women in cybersecurity, and was recognized as one of the Top 20 Canadian Women in Cybersecurity.

  • speaker photo
    Lisa Plaggemier, Moderator
    Executive Director, National Cybersecurity Alliance

    Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.

  • speaker photo
    Shruti Mukherjee
    Director of GRC, GlobalVision

    Shruti is a seasoned Governance, Risk, and Compliance (GRC) professional with over six years of experience designing and executing robust GRC programs for global organizations. With expertise in ISO certifications (9001, 27001, 27701, 27017/18, 42001), data privacy frameworks, and audit management, Shruti has consistently delivered improved compliance efficiency and minimized operational risks.

    Known for leading cross-functional teams, mentoring professionals, and cultivating a culture of accountability, Shruti excels at aligning GRC strategies with business objectives to drive sustainable growth and strengthen stakeholder trust. Whether addressing regulatory challenges or optimizing organizational processes, Shruti brings a pragmatic and impactful approach to fostering compliance and resilience in today’s dynamic business environment.

  • speaker photo
    Arif Hameed
    CISO, C&R Software

    Arif Hameed is a seasoned and award-winning Cybersecurity leader with more than 20 years of technology experience. He is a Chief Information Security Officer and has had roles in Security Advisory, IT Risk and IT Audit at various Financial Institutions and Service Providers. He actively volunteers for professional associations including ISACA, Cloud Security Alliance, EC-Council and participates in advisory committees for academic programs in Cybersecurity and IT Audit. He also has presented, moderated, and took part in panels for Cyber conferences including the RSA Conference, InfoSec World, Secure World etc. He has obtained the CISSP, CISA, CRISC, GSTRT, ISO27001 LA and ABCP certifications. He also has a Level II (Secret) Canadian Federal Government clearance.

  • speaker photo
    Rana Khurram
    Director, Information Security, GRC, C&R Software

    Rana Khurram is a seasoned security professional with 15+ years of experience working in different security domain such as GRC (Governance, Risk & Compliance), incident response, and customer trust. He has led security programs successfully across various industries (banking, business processing, credit unions, software development) and helped organizations to obtain certifications/attestations from frameworks like SOC1-2, PCI DSS, ISO 27001, and NIST CSF.

    Currently, as Head of Information Security-GRC at Jonas Software (doing business as C&R Software), Rana manages global security framework, customer trust initiatives, and provides mentorship to security teams. He holds certifications including CISSP, CISM, PCI-ISA/PCIP, and ISO 27001 Lead Auditor. Rana is skilled in aligning security with business goals, customer handling from security perspective, managing risks, and promoting cybersecurity awareness across organizations.

  • speaker photo
    Ben Crocker
    Senior Director of Product Management, Cyberhaven
  • speaker photo
    Bart Lenaerts
    Sr. Threat Intel Product Marketing Manager, Infoblox

    Bart Lenaerts is a Senior Threat Intelligence Product Marketing Manager with Infoblox. Bart is a 20+ year veteran in Network Systems & Security with a focus in Digital Risk Management and Automated Investigations.

  • speaker photo
    Rafael Ramirez
    Vendor Risk Manager, Manulife

    Rafael Ramirez is a cybersecurity professional with over 20 years of experience in global network routing, IT management, and cybersecurity. He has worked with major enterprises, including Magna International, IBM, TD Bank, and Telefonica, leading initiatives across the health, finance, technology, and mobility sectors. Currently, at Manulife, he is developing GenAI agents for Third-Party Risk Management to assess vendor cybersecurity.

  • speaker photo
    Sanjay Sharma, Moderator
    CISO, Zafin

    Sanjay Sharma is a cybersecurity leader and military veteran with over 20 years of experience in enterprise security, risk management, and IT governance. As CISO at Zafin, he drives security strategy, compliance, and incident response, having led cybersecurity programs for Fortune 500 companies, global enterprises, and government agencies. With expertise in Zero Trust, security automation, and third-party risk management, he has held key roles at Pathway Communications, Toronto Hydro, PwC, Deloitte, and the United Nations.

    A former military officer, Sanjay applies a disciplined, strategic approach to securing enterprise environments and critical infrastructure. His C|CISO, CISSP, CISA, and PMP certifications highlight his commitment to security excellence. A frequent speaker and panelist, he shares insights on cyber risk, AI-driven security, and cloud security best practices, helping organizations stay ahead of evolving threats.

  • speaker photo
    Kevin Dreyer
    IT Director & CISO, Maple Reinders Group

    Kevin Dreyer is an IT Director and CISO with over 25 years of industry experience for a General Contractor securing a national network and its 400 users across a hybrid cloud infrastructure. He fell in love with computers at age 12 when a cousin introduced him to programming, and has never looked back. Having dropped out of college due to the lures of the darker side of computer security, he has spent his adult life working on the defensive side while finishing a college diploma and working on certifications from IBM, Cisco, Novell, Microsoft, Mile2, and finally CISSP about two years ago.

  • speaker photo
    Evgeniy Kharam
    Cybersecurity Architect and Evangelist

    Evgeniy is built and wired differently. As a father of four, including twins, he has mastered the art of remaining unflappable in the face of adversity. His career, which began on the technical frontlines as a firewall deployment engineer, has evolved remarkably to a VP of Architecture at The Herjavec Group. This journey has provided him with a panoramic view of cybersecurity, showcasing his ability to navigate and lead across all its domains. Beyond his corporate achievements, Evgeniy's passion for the field extends to founding two podcasts—one technical Security Architecture, the other business-focused Cyebr Inspiration—and moderating panels and interviews for the industry. He uniquely blends his personal passions with his professional life by co-founding a cybersecurity-focused ski and snowboard conference, creatively merging lifestyle with industry engagement. Evgeniy now runs his own cyber/media consulting services, leveraging his extensive industry knowledge and media expertise to guide clients through the complexities of cybersecurity.

  • speaker photo
    June Leung
    Director, IAM, IGM Financial

    Intuitive, result-driven Cybersecurity Leader with notable success directing a broad range of enterprise Cybersecurity initiatives with over 15 years of experience in the financial cybersecurity vertical. Defining Cybersecurity strategy and roadmap, implementing cloud security, managing an annual budget of over $4 million. Effective management experience steering and directing all aspects of operations, metrics reporting, compliance, and resource planning. Outstanding leader inspiring high-performance team through coaching, training and mentoring. Processing strong business acumen, interpersonal and communication skills and be able to proactively convey operational and security needs to Senior Executives. Regular speaker at Cybersecurity events and non-profit organization for new comers.

  • speaker photo
    Gennady Duchovich, Moderator
    Principal Cybersecurity Advisor, 1SEC Solutions Inc

    Gennady Duchovich is an Information Security leader with more than two decades of experience in IT governance and security operations. His unique background combines military service with extensive industry expertise. Gennady specializes in driving transformation and adoption of next-generation cybersecurity solutions, aligning security policies with global standards. As a former Head of Cybersecurity at a Canadian bank and an active member of the Toronto CISO governing body, he inspires cultural change through leadership, peer influence, and by demonstrating tangible business value. Gennady is a frequent speaker at industry events, sharing insights on cybersecurity transformation and resilience.

  • speaker photo
    Michaela Clouston
    Sr. Manager, Enterprise Security Education, Bank of Montreal

    Michaela Clouston is a cybersecurity leader specializing in workforce development, security education, and risk management. As the Senior Manager of Enterprise Security Education at Bank of Montreal, she designs and leads training programs, exercises, and cybersecurity behavioral remediation initiatives to strengthen awareness across the enterprise.
    Passionate about career growth in cybersecurity, Michaela actively mentors professionals and collaborates on workforce development strategies. She is a GIAC Advisory Board member, holds the GIAC Information Security Fundamentals (GISF) and ISC2 Certified in Cyber Security certifications, as well as a bachelor’s degree from the University of Toronto.

  • speaker photo
    Hendra T. Hendrawan
    Professor, Seneca Polytechnic; Technical Counselor, Security & Privacy Practice, Info-Tech Research Group

    Hendra T. Hendrawan has more than 25 years of experience in IT and cybersecurity.

    He currently is a Technical Counselor in the Security & Privacy Practice at Info-Tech Research Group focusing on IS strategy initiative, policy development, risk management, and cybersecurity best practices. Prior to joining Info-Tech Research Group, Hendra managed an information security team at a university, oversaw a PCI compliance program, spoke at conferences, and managed risk portfolios for an online bank and a Capital Markets business unit at a Canadian financial institution.

    Hendra holds an MBA from Ted Rogers School of Management, Toronto Metropolitan University, a BSc in Computer Science, and a BA in Information Systems from York University. He has also completed and holds numerous certifications, including CISSP, CCSP, PCIP, GSNA, ITIL, GCIH, GWAS, GPPA, and GSEC.

    Hendra is passionate about learning and sharing knowledge. He is currently a professor at Seneca Polytechnic, and an adjunct professor at University of Toronto.

  • speaker photo
    Camille Kloppenburg
    VP & Treasurer, ISC2 Toronto Chapter; Director, Security Program Management, Security Compass

    Camille Kloppenburg is a distinguished cybersecurity leader with more than 20 years of experience in financial services and cybersecurity technology sectors. Her unique blend of business acumen and technical expertise allows her to guide organizations in building secure products from the ground up.

    Her career has been shaped by a diverse range of roles including coding elliptic curve cryptography solutions, product management of cybersecurity and banking products, business consulting, technology delivery for enterprise risk management, and running her own consulting firm. Each experience contributes to her holistic approach in cybersecurity.

    Currently, Camille serves as the VP and Treasurer for the ISC2 Toronto Chapter. As the Director at Security Compass, she heads the Security Program Management team, ensuring that customers thrive with Security Compass’ offerings.

    A registered Professional Engineer (P. Eng.), Camille also holds active certifications in CISSP, CISM, and PMP, and is certified in the fundamentals of Factor Analysis of Information Risk (FAIR). She earned her B.A.Sc. in Engineering Science, Aerospace Engineering, from the University of Toronto.

  • speaker photo
    Raphael Adeyemo, Moderator
    President, ISC2 Toronto Chapter; Sr. Manager, Technology Risk Management, Manulife

    Raphael Adeyemo is a seasoned risk management and cybersecurity leader with over 15 years of experience spanning IT risk management, cyber resilience, digital investigations, service delivery, process optimization, strategy, and digital transformation across banking, insurance, energy, technology, and academia. He is the Senior Manager of Information Risk Management at Manulife, where he develops and executes risk analysis strategies to proactively identify and mitigate risks, enabling informed decision-making and business resilience.

    As President and Chair of the Board of Directors for the ISC2 Toronto Chapter, Raphael has strengthened the Chapter’s presence in Canada through strategic governance, industry partnerships, and community-driven initiatives. Committed to education and thought leadership, he is an adjunct professor at Conestoga College, a Program Advisory Council (PAC) Member at Northeastern University, Toronto. He serves on the Harvard Business Review Advisory Board, contributing to discussions on leadership and resilience.

    Raphael holds a dual MBA from Cornell University and Queen’s University and a Digital Leadership Certificate from Cornell University. His expertise bridges cybersecurity, risk management, and business strategy, making him a key contributor to organizational resilience and industry advancement.

  • speaker photo
    Ali Abbas Hirji
    VP, Cybersecurity & Technology, Computek College; Special Advisor, Cybersecurity & ICT Initiatives, 369 Global

    With more than 16 years in IT leadership, Ali specializes in Governance, Risk and Compliance (GRC), aligning with ISO 27001, NIST and SOC 2 to build secure and compliant infrastructures. His expertise spans IT security, risk management, and developing high-performing teams.

    In post-secondary education, he has taught at institutions across Canada, including Algoma University, Sheridan College, and York University, and served as Academic Chair for IT at the University of Fredericton. He also led the expansion of Durham College's Cybersecurity Innovation Center and established AI & Cybersecurity labs.

    His experience includes senior roles at ORION, managing connectivity projects and leading cybersecurity initiatives across Ontario, from tabletop exercises to keynotes at Graylog GO. As a strategic advisor at SiberX and VP of Cybersecurity and Technology at Computek College & 369 Global, he also led cyber training for Youth Employment Services, shaping talent through specialized programs.

  • speaker photo
    Imran Ahmad
    Partner and Head of Technology; Co-Chair of Data Protection, Privacy, and Cybersecurity, Norton Rose Fulbright Canada LLP

    Imran Ahmad is the Canadian head of our technology sector and Canadian co-head of our information governance, privacy and cybersecurity practice. He is based in our Toronto and Montreal offices and is recognized as a leading cybersecurity lawyer by several legal directories.

    Imran advises clients across all industries on a wide array of technology-related matters, including outsourcing, cloud computing, SaaS, strategic alliances, technology development, system procurement and implementation, technology licensing and transfer, distribution, open source software, and electronic commerce.

    As part of his cybersecurity practice, Imran works very closely with clients to develop and implement practical strategies related to cyber threats and data breaches. He advises on legal risk assessments, compliance, due diligence and risk allocation advice, security, and data breach incident preparedness and response.

    In addition, Imran often acts as "breach counsel" in the event of a cybersecurity incident, such as a data or privacy breach, and has extensive experience in managing complex security incidents and cross-border breaches. He also provides representation in the event of an investigation, an enforcement action or a litigation.

    Imran is the author of Canada's first legal incident preparation and response handbook titled Cybersecurity in Canada: A Guide to Best Practices, Planning, and Management (LexisNexis, August 2017). Imran is the author of Canada's first legal incident preparation and response handbook titled Cybersecurity in Canada: A Guide to Best Practices, Planning, and Management (2nd Edition) (LexisNexis, March 2021).

    In his privacy law practice, he advises clients on compliance with all Canadian federal and provincial privacy and data management laws. He has a particular focus on cross-border data transfer issues and enterprise-wide governance programs related to privacy and information governance. Imran is the former chair of the Privacy and Access to Information Section of the Ontario Bar Association.

    Imran is an adjunct professor at the University of Toronto's Faculty of Law, where he teaches cybersecurity and privacy law.

  • speaker photo
    Alpha Chan
    CISO, Technology & Transformation Command, Toronto Police Service

    Alpha Chan is the Chief Information Security Officer for the Toronto Police Service. As a former police Staff Sergeant, his 30 years of innovative investigative experiences include specialized functions that range from surveillance, covert projects, and cyber operations.

    Along with cybersecurity responsibilities, Alpha created Toronto Police's groundbreaking Artificial Intelligence governance, the first Canadian public safety organization to address the emerging technology with best practices.

    Alpha continues to leverage his experience by building partnerships from industry leaders to address issues that impact the delivery of public safety services.

  • speaker photo
    Aaron Chow
    Principal Cryptographer, Director of Cloud Security Patterns and Policy-as-Code, Scotiabank

    Aaron Chow is currently Principal Cryptographer and Director of Cloud Security Patterns and Policy-as-Code at Scotiabank, leading a diverse team to accelerate and secure the bank’s cloud transformation. As the Principal Cryptographer, he is responsible for the Cryptography domain at Scotiabank, providing cryptographic expertise and heads up the Crypto Council at the Bank. He is co-chair of the Canadian Financial Institution Quantum Working Group, and is also an active participant in industry-government-academic quantum working groups. He is also a part-time faculty at Georgian College where he teaches cryptography. Academically, he was trained in mathematics, economics, and statistics, and holds a PhD in number theory from the University of Toronto where he contributed to the “hardness of factoring” problem.

  • speaker photo
    Maggie Calle
    VP & CISO, Varicent

    Maggie Calle is the Chief Information Security Officer at Varicent, with more than 25 years of experience in cybersecurity leadership across the financial, insurance, retail, and technology sectors. She is known for successfully implementing cybersecurity and risk management programs that enable the business and drive innovation and digital transformations.

    In 2024, she was recognized in the CISOs Top 100 Accelerated list for her impact in the field. She also received the 2023 Trailblazer Award from Ted Rogers School of Management, which honors a distinguished Ted Rogers graduate who has demonstrated exceptional accomplishments in their chosen profession and was inducted into its Alumni Wall of Distinction. Other accolades include being named one of Canada’s Top 20 Women in Cybersecurity by IT World Canada, Women to Watch by Risky Women organization, a Global Top Influencer in Cybersecurity by IFSEC Global, Woman in Leadership by SiberX and also receiving employers’ recognitions such as Varicent's Leadership Vantage, Aviva’s CIO and BMO's Best of the Best awards.

    She is a public speaker, mentor, and a co-author of two #1 international bestsellers: "Evolution of Leadership in STEM" and "Women Transforming the Landscape of Science and Technology." Maggie holds CISSP, PMP, and Chartered Director certifications. Her academic achievements include a Bachelor of Commerce in IT Management from Toronto Metropolitan University, an MBA in Risk Management and Corporate Governance from Athabasca University, Masters in Project Management from Schulich University, and Diplomas in Human Resources and Computer Programming and Analysis from Seneca Polytechnic.

  • speaker photo
    Lina Dabit, Moderator
    RCMP Officer in Charge, Cybercrime Investigative Team Toronto

    Lina Dabit joined the RCMP in 1994 and started her career in British Columbia where she spent 13 years posted to detachments up and down eastern Vancouver Island. She was lucky for the opportunity to work a variety of duties ranging from uniform patrol, drug section, major crime, intelligence, border integrity, and running a police boat while working solo in the Gulf Islands.

    After transferring to Ontario in 2008, she focused on organized crime and national security, and as an Investigative Interviewing Subject Matter Expert, she went on to establish the RCMP interview team in Ontario.

    She was commissioned to Inspector in 2017 and became the commander of the Air Marshal Toronto Field Unit. In 2021, she was selected to lead the Cybercrime Investigative Team in Ontario. She is currently working to establish an innovative operational Cyber hub focused on collaboration between federal, international and private sector partnerships.

  • speaker photo
    Happy Hour
  • speaker photo
    George Kamide
    Co-Host, Bare Knuckles & Brass Tacks Podcast
  • speaker photo
    George Al-Koura
    CISO, Ruby; Co-Host, Bare Knuckles & Brass Tacks Podcast
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Propel your cyber career at SecureWorld!

Hone your skills and connect with your regional peers in InfoSec.