Day 1 - Tuesday, March 12, 2019

7:30
Registration Opens and Refreshments Served
8:30
Opening Remarks from the Chair
8:45

KEYNOTE PRESENTATION

Impact of Cybercrime on Canadian Businesses
9:30
Interactive Roundtable Discussions (2 rotations, 45 minutes each)
11:00
Networking and Refreshment Break
11:15
The Evolution of Cyber Attacks and Insurance Response
11:45
Interactive Roundtable Discussions (2 rotations, 45 minutes each)
1:15
Networking Lunch
2:15
The User (and Identity) is the New Security Perimeter
2:45
Interactive Roundtable Discussions (2 rotations, 45 minutes each)
4:15
Networking and Refreshment Break
4:30
Defining, Assigning and Communicating Accountability to Manage Security Risk
5:00
Closing Remarks from the Chair followed by a Networking Reception

Day 1 - Tuesday, March 12, 2019

7:30
Registration Opens and Refreshments Served
8:30
Opening Remarks from the Chair
8:45

KEYNOTE PRESENTATION

Impact of Cybercrime on Canadian Businesses

Haig McCarrell
Director – Investment, Science and Technology Division, Economic Statistics Field
Statistics Canada / Government of Canada

While high-profile cyber security incidents affecting large enterprises are frequently covered in the media, little is known of how cyber security risks affect the overall business population in Canada. This discussion will explore the results from the 2017 Canadian Survey of Cyber Security and Cybercrime, which collected information on the types of cyber security measures businesses employ, the practices they undertake to identify security risks, the types of cyber security incidents they faced in 2017, their incident reporting practice, and the costs associated with preventing, detecting and recovering from cybercrime.

9:30
Interactive Roundtable Discussions (2 rotations, 45 minutes each)
11:00
Networking and Refreshment Break
11:15
The Evolution of Cyber Attacks and Insurance Response

Jessica Foster J.D.
Legal Consultant Financial Services Group
Aon Reed Stenhouse Inc.

  • Current trends – state sponsored cyber-attacks, ransomware and ‘W-2’ fraud
  • The cost of loss – how much could a cyber incident cost your organization?
  • Cutting edge risk transfer solutions – How cyber insurance is responding

11:45
Interactive Roundtable Discussions (2 rotations, 45 minutes each)
1:15
Networking Lunch
2:15
The User (and Identity) is the New Security Perimeter

Matt Laba
Director Cybersecurity and IS Operations
Gibson Energy Inc.

  • Identifying stronger and more sophisticated methods to better secure the user and their identities as users increasingly operate outside the bounds of the corporate network
  • Understanding the new “Security Perimeter”, its challenges, risks and most importantly, how you protect your organization and data from the current-day and future threats and potential attacks
  • Understanding the importance of Identity and Access Management (IAM), Multi-Factor Authentication (MFA), End-User Security Awareness and Training Programs and Endpoint Detection and Response (EDR).

2:45
Interactive Roundtable Discussions (2 rotations, 45 minutes each)
4:15
Networking and Refreshment Break
4:30
Defining, Assigning and Communicating Accountability to Manage Security Risk

Richard Barlow
Director, Information Security and Privacy, Ministry of Finance
Government of British Columbia

  • Establishing security accountability, roles and responsibilities within shared service and outsourced service delivery models
  • Identifying and communicating security risk, creating organizational security awareness, and conducting security compliance oversight

5:00
Closing Remarks from the Chair followed by a Networking Reception