Agenda
- Jump to:
- At a Glance
- Day 1
- Print-friendly Format
Day 1 - Tuesday, March 12, 2019
7:30 |
Registration Opens and Refreshments Served |
8:30 |
Opening Remarks from the Chair |
8:45 |
KEYNOTE PRESENTATIONImpact of Cybercrime on Canadian Businesses |
9:30 |
Interactive Roundtable Discussions (2 rotations, 45 minutes each) |
11:00 |
Networking and Refreshment Break |
11:15 |
The Evolution of Cyber Attacks and Insurance Response |
11:45 |
Interactive Roundtable Discussions (2 rotations, 45 minutes each) |
1:15 |
Networking Lunch |
2:15 |
The User (and Identity) is the New Security Perimeter |
2:45 |
Interactive Roundtable Discussions (2 rotations, 45 minutes each) |
4:15 |
Networking and Refreshment Break |
4:30 |
Defining, Assigning and Communicating Accountability to Manage Security Risk |
5:00 |
Closing Remarks from the Chair followed by a Networking Reception |
Day 1 - Tuesday, March 12, 2019
7:30 |
Registration Opens and Refreshments Served |
8:30 |
Opening Remarks from the Chair |
8:45 |
KEYNOTE PRESENTATIONImpact of Cybercrime on Canadian BusinessesHaig McCarrell While high-profile cyber security incidents affecting large enterprises are frequently covered in the media, little is known of how cyber security risks affect the overall business population in Canada. This discussion will explore the results from the 2017 Canadian Survey of Cyber Security and Cybercrime, which collected information on the types of cyber security measures businesses employ, the practices they undertake to identify security risks, the types of cyber security incidents they faced in 2017, their incident reporting practice, and the costs associated with preventing, detecting and recovering from cybercrime. |
9:30 |
Interactive Roundtable Discussions (2 rotations, 45 minutes each) |
11:00 |
Networking and Refreshment Break |
11:15 |
The Evolution of Cyber Attacks and Insurance ResponseJessica Foster J.D.
|
11:45 |
Interactive Roundtable Discussions (2 rotations, 45 minutes each) |
1:15 |
Networking Lunch |
2:15 |
The User (and Identity) is the New Security PerimeterMatt Laba
|
2:45 |
Interactive Roundtable Discussions (2 rotations, 45 minutes each) |
4:15 |
Networking and Refreshment Break |
4:30 |
Defining, Assigning and Communicating Accountability to Manage Security RiskRichard Barlow
|
5:00 |
Closing Remarks from the Chair followed by a Networking Reception |