NEWS FROM MAPLESEC 2023
Are you dealing with the challenges of the ever-changing world of cybersecurity? MapleSEC 2023: Championing Cyber Change brings you two days of thought provoking thought leadership. The sessions are fast paced and content rich, featuring industry experts and professionals from the front lines of industry and cybersecurity.
Day one will feature thought-provoking speakers and panel discussions, providing valuable insights into the dynamic cybersecurity landscape. Day two will offer interactive workshops to equip you with actionable skills to enhance your organization’s security posture.
MapleSEC 2023 is primarily a virtual conference, however, we are offering a limited number of invitations to attend day 1 in person. If you are a senior IT decision maker Director+ at an organization larger than 100 employees and would like to join us live, please email kmclean@itwc.ca
SPEAKERS
A/Director General, Secure Solutions and Services, Canadian Center for Cyber Security
PROGRAM
DAY 1
Click the arrow to find out more about each session.
Welcome/Opening Remarks
Jim Love, CIO, ITWC
Opening Keynote: The State of Cybersecurity in Canada
Melanie Anderson, A/Director General, Secure Solutions and Services, Canadian Centre for Cyber Security
MapleSECs introductory session will explore the changes that we have and will face as Canadian companies and cyber security professionals.
Presentation: Meeting the Resource Challenge with “Quiet Hiring”
Brought to you by Gartner
We are all struggling to find and hold onto great people. Gartner Analyst Satyamoorthy Kabilan takes a novel approach to the resource challenge with something that Gartner calls “Quiet Hiring.”
Presentation: The Elephant in the Room
Brought to you by Gartner
While cybersecurity discussions often focus on 'how' to protect, this session emphasizes the importance of knowing 'what' we are safeguarding – our data. Data lies at the core of any organization, and its protection is vital for resilience against cyber threats. Join us as we uncover the overlooked dimension of cybersecurity, gaining insights to enhance our stance and ensuring comprehensive data-driven cybersecurity strategies.
Richard Freeman, Business Portfolio Manager, Enterprise Workflow Solutions, Ricoh Canada
Panel Discussion: Cybersecurity and Law Enforcement: Bridging the Divide
This discussion will revolve around actionable strategies at the intersection of cybersecurity and law enforcement, featuring insights from experts in the field. The panel aims to promote a deeper understanding of these crucial domains and provide valuable takeaways for the audience.
Moderator:
Brennen Schmidt, Consultant and Author
Panelists:
Deirdre Morris, Lead for Strategic Risk Management, National Cyber Security Centre Ireland
Jo-Anne Yau, LLM
Kevin Paul, Director of Cybersecurity Operations, Cybera
Presentation: The Modern Attack; what successful Adversary behavior looks like and what organizations can do about it
Brought to you by Gartner
Duke McDonald, Intel Sales Manager, CrowdStrike, Inc.
Lightning Commercial
Sponsored by TMU
Fireside Chat: How to protect your organization in the Face of A.I.
Sponsored by Cloudflare
The conversation focuses on the challenges of safeguarding organizations in the face of Artificial Intelligence. Many companies are attempting to address this issue, although they frequently lack well-defined policies and the capability to detect or manage AI tools effectively. The dialogue also explores the evolving workforce and the ongoing impact of AI on employees and their roles within organizations.
Participants
Jim Love, CIO, ITWC
John Engates, Field Chief Technology Officer, Cloudflare
Real Resiliency: What is it and how do we build it
Sponsored by Kyndryl
Too many companies find that when they try to recover from an incident their “failover plan” fails. More and more we are learning that our best plans for protection of systems and even data are not enough to guarantee what we really need - speedy recovery from an incident. While we do need strong protection and processes, we really need to understand how to build an organization that can recover quickly.
Moderator:
Jim Love, CIO, ITWC
Panelists:
Denis Villeneuve, CISSP, Security & Resilience Practice Leader, Kyndryl Canada
Jason Maynard, Field CTO- Cisco Security, Cisco
Panel Discussion: Survival Guide for Cybersecurity Leaders
Brought to you by Gartner
Gartner’s Geoff Crampton and Satyamoorthy Kabilan joins host Jim Love for a panel discussion on how to deal with burnout, mental health, juggling priorities, developing hiring and retention strategies, and all the other challenges we face.
Moderator:
Jim Love, CIO, ITWC
Panelists:
Geoff Crampton, Executive Partner, Gartner
Dr. Satyamoorthy Kabilan, Senior Executive Partner, Gartner
Closing Remarks
Networking Reception
DAY 2
Click the arrow to find out more about each session.
Welcome/Opening Remarks
Jim Love, CIO, ITWC
John Del Grande, Ecclesiastical Insurance
Panel Discussion: Healthcare Cybersecurity: Navigating the Information Technology-Operational Technology (IT-OT) Intersection in North America
This panel discussion will focus on the intersection of information technology and operational technology in healthcare cybersecurity in Canada and the United States. The panelists, experts in their respective fields, will shed light on the challenges and opportunities in this domain, emphasizing the importance of collective efforts to enhance healthcare cybersecurity.
Moderator:
Brennen Schmidt, Consultant and Author
Panelists:
David Shipley, CEO, Beauceron Security
Matt Gehrisch, vCISO, Focivity
Vivek Virma, CISO, eHealth Saskatchewan
Panel Discussion: Securing Operational Technology: Strategies, Distinctions, and Trends
This panel will focus on various aspects of OT cybersecurity in Alberta, including risk reduction, differences from IT cybersecurity, company initiatives, trends, and a comprehensive view beyond data breaches. The goal is to provide valuable insights and strategies for enhancing OT cybersecurity in the region.
Moderator:
Yogi Schulz, Senior Consultant at Corvelle Consulting
Panelists:
Tom Everett, Vice President Systems Architecture and CISO, Metrolinx
Chad Grose, OT Cybersecurity & Automation Specialist, Keyera
Ronnie Scott, Chief Technology Officer, Charter
Fireside Chat
Sponsored by Kyndryl
Workshop #1
Bridging the Gap: Cybersecurity Talent Management Workshop for a Resilient Canada
Cyber attacks are increasing, which is creating a high demand for cybersecurity experts. But Canada doesn’t have enough trained cybersecurity professionals to meet that demand and that leaves our organizations, communities and our economy vulnerable to security threats. This workshop will briefly summarize recent research on the cybersecurity talent challenge and discuss insights published in the Rogers Cybersecure Catalyst Talent Management Playbook which can help organizations refine their approach to recruiting and retaining cybersecurity talent.
Randy Purse, Senior Cybersecurity Advisor, Rogers Cybersecure Catalyst
Workshop #2
Evaluate your SMB Cybersecurity Defences at Warp Speed
Cybersecurity expert Yogi Schulz shares a practical, cost-effective approach to achieving a high level of assurance in your cybersecurity defenses. Discover the reasons behind management inaction, the consequences of neglecting cybersecurity, and how to overcome impediments. Learn what comprehensive cybersecurity risk assessment entails and explore the value of CIS controls. Don't miss this opportunity to safeguard your digital assets and data without breaking the bank. Secure your spot today and be part of the cybersecurity revolution!
Yogi Schulz, Sr. Consultant, Corvelle Consulting
Produced By
SUPPORTED BY
Sponsored By
Let’s Get In Touch!
For more information about our conferences or partnership opportunities
Produced By
Sponsored By
It Takes A Team
We’re all in search of the 3R’s of cyber security – readiness, resilience and recovery. We want to be able to prevent what we can and rapidly recover when things go wrong.
But you can’t do it alone. It takes a team. And no matter what size your organization is you are going to have the same issues – not enough people, even if we could hire them.
So what do you do?
Our next MapleSEC Satellite series event is 90 minutes packed with information that you can use to help you find a way to build that team. How can you:
- Recruit, train and retain resources even in a tight market
- Use upskilling as a way of discovering and leveraging resources you might not have considered
- Leverage existing resources that you might not have considered
- Use new technology to make your existing team more productive
The MapleSEC Satellite Series
Session Two: June 21
1:00 PM – 2:40 PM ET
AGENDA
Welcome and Opening Remarks
Jim Love, CIO, ITWC
Panel: The Talent Challenge - Sponsored by PluralSight
Many CISOs will tell you that given their choice, they would hire/recruit the right people, regardless of existing tech skills or qualifications. This session will cover how to evaluate the right people and find ways to upskill them to meet your needs.
Moderator:
Jim Love, CIO, ITWC
Panelists:
Michael Teske, Principal Security Author, Pluralsight
Naveed Zahid, AVP Engineering Transformation, Manulife
Mike Glover, CISO, MaximBET
Fireside Chat - The AI Battlefield - Sponsored by Darktrace
Many people are worried that AI will take jobs away, with the massive shortage of people in cybersecurity, we have to be one of the areas that doesn’t fear AI – we welcome it. In fact, we must embrace it.
Jim Love, CIO, ITWC
Dave Masson, Director of Enterprise Security, Darktrace
Panel: Team building and Resiliency
Whether it’s your dedicated team or a way of “conscripting” a volunteer army of co-workers, team building strategies are core to how you can get the most from every resource at your disposal.
Moderator:
Jim Love, CIO, ITWC
Panelists:
David Shipley, CEO, Beauceron Security
Kathryn Cameron, COO, Beauceron Security
Closing Remarks
WorkShop
Generative AI as a threat and an asset. We’ll do a bonus session that will give you the most up to date info on Generative AI tools like ChatGPT and others. In this special workshop, we’ll show how to use these as a “force for good” in training, designing security and recovery plans and more.
SPEAKERS
Jim Love
CIO, ITWC
Naveed Zahid
AVP Engineering Transformation, Manulife
Michael Teske
Principal Security Author, Pluralsight
Mike Glover
CISO, MaximBET
Dave Masson
Director of Enterprise Security, Darktrace
David Shipley
CEO, Beauceron Security
Kathryn Cameron
Chief Operating Officer, Beauceron Security
Sponsored By
Produced By
Supported By
Rethinking Cybersecurity
Now in its second year, MapleSEC carries on its satellite series in 2023. These short sessions bring us together to keep up with cybersecurity topics between the annual two-day MapleSEC conferences in October.
Join us for 100 minutes to learn, network, and move your security agenda forward. This series of virtual gatherings are focused on hands-on learning from cybersecurity leaders.
Aimed at business and government leaders these 100-minute sessions offer insights and practical tips for organizations to protect against growing cybersecurity threats. Whether you’re interested in new approaches to building a risk management culture, training, or tips on how to prepare for the newest threats, the satellite series are must-attend events.
Topics for these sessions are developed in consultation with experts in the community and tailored to address current issues and concerns. We will announce the topic of our February session by the end of January.
Mark your calendar and check back with us in the coming weeks.
The MapleSEC Satellite Series
Session One: February 28
1:00 PM – 2:40 PM ET
AGENDA
Session One: February 28, 2023
Welcome and Opening Remarks
Jim Love, CIO ITWC
Fireside Chat: What’s on the Radar of the CTO
Jim Love, CIO, ITWC
John Engates, Field CTO, Cloudflare
Fireside Chat: AI Unplugged - a realistic view of AI and security
Jim Love, CIO, ITWC
Dave Masson, Director of Enterprise Security, Darktrace
Quiz - Sponsored by Crowdstrike
Test your knowledge with some fun trivia
Presentation: Compliance and Regulation Updated
Imran Ahmad, Partner, Norton Rose Fulbright
Sean Lynch, Director of Client Strategy, Ricoh Canada
Speakers
Jim Love
CIO, ITWC
Dave Masson
Director of Enterprise Security, Darktrace
John Engates
Field CTO, Cloudflare
Imran Ahmad
Partner, Norton Rose Fulbright
Sean Lynch
Director of Client Strategy, Ricoh Canada
Produced By
Sponsored By
AGENDA
Day 1: October 19, 2022 (In-person)
Welcome and Opening Remarks
Jim Love, CIO ITWC
OPENING KEYNOTE:
Fighting Back - Taking a Proactive Approach to Security
Nick Aleks, Senior Director of Security, Wealthsimple, Author of Black Hat GraphQL & DEFCON Toronto Co-Founder
Video Break
These are short presentations that provide a valuable and practical glimpse into some of the most innovative and powerful security tools, processes, techniques and research. They are the TED talk of Cyber Security done in 5 minutes.
Threatscape - Understanding Current and Emerging Threats
As a security professional and business executive, does it feel like you’re always playing catch-up? Do you find yourself committing resources to fight yesterday’s battles? Well you are not alone but you are vulnerable!
Panelists:
John del Grande, VP Business Solutions, Ecclisiastical Insurance
Jim Love, Cio ITWC
Video Break
Break
FireSide Chat - Email Security
Jim Love CIO, ITWC
Alkin Gorgun, Field CISO, Cloudflare
Video Break
Panel
Panel: Ransomware Attacks - You don’t have to be a victim - Sponsored by Ricoh
Our panel will walk you through the key elements of prevent and damage mitigation including discussion of the role, value and limitations of cyber insurance.
Moderator: Epsit Jajal, Virtual CIO – Ricoh IT Services
Panelists:
Greg Markell,President & CEO, RIDGE CANADA
Maryam Asgariazad, Director, Information Security, Alterna Savings
Video Break
Panel
Securing The Investment You Need to Protect Your Data: Creating a Sense of Urgency: Talking to Business Executives and Making the Case
In this session you will hear not just how to make the case for greater investment this quarter, but ensure your executive buy-in to ongoing vigilance and the resources you need to keep the organization secure.
Moderator:
Jim Love, CIO, ITWC
Horace Wright, Senior Manager, Unit Risk & IT Transformation – I&O & Security Assets, National Bank of Canada
Azim Boblai, CISO, Toronto Community Housing
Video Break
Lunch
Quiz - Sponsored by Okta
Test your knowledge with some fun trivia
Keeping Up To Date - The Essential Guide to Privacy and Security
This session will provide an update on privacy regulation, an exploration of how privacy and security can best work with one another and leave you with a checklist of things you have to know and do to ensure that you reduce the risks to your organization. Discussion will include developments in the US and Canada
Wendy Hulton, Partner, Dickinson Wright
Presentation: Conducting an Effective Investigation Post Breach
One of the key things you will need to do post a breach of your security is to carry out an effective investigation to identify the cause. This is essential for three reasons:
1. Prevent further immediate loss
2. Improve your defenses to prevent future loss
3. If possible retrieve the information
In this session you will hear about the essential of investigation as well as some of the pitfalls to avoid.
Keith Elliott, President and CEO, Reed Research
Break
Cybersecurity management Process awareness from the Government Prospective
Rahim Charania, Director, Cyber Security – Strategy and Design, Office of the Chief Information Officer of Canada
Wiz Kid Presentation
Shiza Charania
Closing Panel:
The CISO Unplugged. Leading CISOs Share Their Hopes and Fears for a Secure Future
The day will conclude with a wide-ranging discussion among three leading CISO’s. They will discuss the route they took to the role, the skills they see as critical now and in the future, how they work with other C-Suite executives, and share what keeps them up at night and what makes them leap out of bed in the morning as they think about the world of threat and opportunity they face every day.
Moderator: Imran Ahmad, Partner and Head of Technology, Co-Chair Data Protection, Privacy and Cybersecurity at Norton Rose Fulbright
Panelists:
Kevin Dreyer, CISO, Maple Reinders
Samer Adi, CISO, Greenshield Canada
Natalia Bakhtina, Director of Cybersecurity and IT Risk Management, BFL Canada
Closing Remarks
Jim Love, CIO, ITWC
Day 2: October 20, 2022
Welcome and Opening Remarks
Brennen Schmidt
Cybersecurity Author and Speaker
Resourcing the Security Function – Finding Scarce Talent In A Tough Market
On October 3 the Rogers Cybersecure Catalyst released data from a research study on Cyber Talent Transformation in Canada
In this session Rushmi willI share the research findings and the correlated impact, when it comes to the talent gap. The research is designed to be action driven and provides companies with actionable elements that they can address to increase the quantity and quality of cybersecurity applicants while driving diversity.
Rushmi Hasham, Director of Development and Accelerated Cybersecurity Training Programs, Rogers Cybersecure Catalyst, Toronto Metropolitan University
Cybersecurity - the Human Factors
Why cybersecurity matters and how the human factors make it work – or defeat it. Includes the challenges to cyber awareness and tips on how to realistically implement cyber discipline and building a culture of user engagement.
Natalia Bakhtina, Director of Cybersecurity and IT Risk Management, BFL Canada
Practical Guide to Cybersecurity Governance - Why Governance is part of essential protection.
Governance is not about committee meetings and dull droning discussions about policies no one will read. It’s an action oriented approach that is essential to protecting your organization. Yet many organizations struggle to make it work.
John del Grande, VP Business Solutions, Ecclisiastical Insurance
CyberSecure Canada Certification Program Update
An update on the CyberSecure Canada certification program led by Innovation, Science and Economic Development Canada (ISED). This program is transitioning to the national standard produced by the Council for SMEs in cybersecurity. Keith will be able to answer questions about the standard including: “What does it cover? Why should I care? What tools and resources are available to help me get my organization certified to the national standard?”
Keith Jensa,
Quiz - Sponsored by Okta
Test your knowledge with some fun trivia
Cybersecurity Essentials for SMBs
While large breaches as high profile organizations make the headlines, cybersecurity should be a concern for your organization no matter your size. The sad truth is that there is no such thing as an organization too small to be a target. And with smaller organizations having less resources the impact on their business can be proportionately far greater than for large corporations.
Mandy D’Autremont, Vice President, Marketing Partnerships, Canadian Federation of Independent Business
Cybersecurity assessment and planning for SMBs - keeping it real
Most small or medium sized businesses (SMBs) think a cybersecurity plan is expensive, consumes too much staff time or is something that they do not have the expertise to do. This misperception causes SMBs to be at considerable risk.
Yogi Schulz has helped companies face these types of challenges. He has designed risk models that are used in the oil and gas industry by small and large companies. He will show how to evaluate Critical Security Controls using a comprehensive, low-cost, and surprisingly low-effort process. The evaluation results produce an actionable list of cybersecurity gaps and a high level of assurance in understanding the state of SMB cybersecurity.
This is a “must see” for SMBs, but would benefit organizations of any size.
Yogi Schulz, Sr. Consultant, Corvelle Consulting
Fireside Chat - IOSecure
Tom Jacoby has seen it all in a career in cyber security and operations that has spanned over three decades. The lessons that he’s learned and the stories that he can tell breathe life into security discussions and give a practical framework for the elements of any cybersecurity plan.
Join Jim Love, CIO, ITWC and Tom Jacoby, Founder and CEO of IOSecure Internet Operations Inc. for a key discussion of four key elements that everyone must consider in cybersecurity planning.
CLOSING PANEL:
Closing Panel: What to do Tomorrow to Prepare for the Day After…
Looping back to the discussion that opened the event on the emerging threat environment, we will conclude the event with a wide ranging discussion of next steps – a call to action as it were, where assembled experts recommend simple, practical tasks you can take on now to be better prepared in the future
Moderator: Brennen Schmidt, Cybersecurity Author and Speaker
Joined by Jim Love, CIO ITWC
Speakers
Jim Love
CIO, ITWC
John Del Grande
VP Business Solutions, Ecclesiastical Insurance
Samer Adi, CISO
Green Shield Canada
Wendy Hulton
Partner, Dickinson Wright
Horace Wright
Senior Manager, Unit Risk, Transformation et performance – Infrastructure, Operations & Security Assets
Epsit Jajal
Virtual CIO – Ricoh IT Services
Rushmi Hasham
Director, Development and Accelerated Cybersecurity Training Programs, Toronto Metropolitan University
Brennen Schmidt
Cybersecurity Author and Speaker
Kevin Dreyer
I.T. Director/CISO, Maple Reinders
Alkin Gorgun
Field CISO, Cloudflare
Rahim Charania
Director, Cyber Security – Strategy and Design, Office of the Chief Information Officer of Canada
Tom Jacoby
Founder and CEO of IOSecure Internet Operations Inc.
Shiza Charania
Wiz Kid
Imran Ahmad
Partner and Head of Technology, Co-Chair Data Protection, Privacy and Cybersecurity at Norton Rose Fulbright
Mandy D'Autremont
Vice President, Marketing Partnerships, Canadian Federation of Independent Business
Greg Markell
President & CEO, RIDGE CANADA
Yogi Schulz
Sr. Consultant, Corvelle Consulting
Maryam Asgariazad
Director, Information Security, Alterna bank
Juliana Scharrer
Program Manager, Accelerated Cybersecurity Training Program, Toronto Metropolitan University
ARCHIVES
Past Maplesec Events available on-Demand (Registration is Required)
OCT
18-19, 2023
Championing Cyber Change
JUN
21, 2023
It Takes A Team
FEB
28, 2023
Rethinking Cybersecurity
OCT
19-20, 2022
Are you Ready?
MAR
24, 2022
Building your Team
FEB
24, 2022
The 3 R’s of Cybersecurity
AUG
5, 2021
SECURITY & AI
MAY
11, 2021
LEARNING & TRAINING
OCT
5-7, 2021
THREE DAILY SESSIONS