Register Now
October 23-26, 2023 Metro Toronto Convention Centre

Cloud Security Summit

Date

Tuesday, October 24, 2023

Location

MTCC Level 700, Room 718 A & B


The eighth Cloud Security Summit at SecTor will take place on Tuesday, October 24, 2023 at the Metro Toronto Convention Centre (MTCC) in downtown Toronto.

The Cloud Security Summit is Canada’s leading cloud security event featuring keynote speakers, panel discussions and networking opportunities, and provides an invaluable opportunity for every security professional to engage with leaders and discuss the future of cloud security.


The Details

Date: Tuesday, October 24, 2023.

The Cloud Security Summit at Sector 2023 is now Sold Out.

Price: $99

Registration is now closed: To register for the 2023 Cloud Security Summit at SecTor visit Registration and add it to your SecTor conference registration.

Venue: The Cloud Security Summit at SecTor will be held on Level 700 in the South Building of the MTCC. More information on how to get there is available.


Agenda

Tuesday, October 24

8:00 - 9:00 AM Networking Breakfast
9:00 – 9:10 AM Welcome and Introductions
  • Dave Millier

    Dave Millier is a Serial Entrepreneur, Off-road Motorcycle Rider & Food Lover. Dave has been involved in cybersecurity for over 20 years. In 2001 he founded an InfoSec company, Sentry Metrics, building one of Canada’s most successful MSSPs before selling the company in 2014. After the sale, Dave’s lifelong passion for reading led him to finally sit down and write his first book, Breached!

    In late 2014, Dave launched Uzado (www.uzado.com), a Cloud-based InfoSec company focused on helping companies simplify Cybersecurity by answering the questions “what now?” or “what next?”. Dave is also the CSO of Quick Intelligence (www.quickintel.com) , a boutique VAR and cybersecurity consulting company, and is the CEO of MIDAC Solutions (www.midac.ca), a Managed IT services provider focused on small to mid-size clients. Dave recently launched Canada Rides (www.canadarides.com) , an off-road motorcycle training company headquartered in beautiful Simcoe County, providing off-road motorcycle and ATV safety training. Dave lives in Ontario with his wife Maria and their two cats.

    In his spare time, Dave volunteers with the Ontario Federation of Trail Riders (www.oftr.ca) and is the Chairperson for the Motorcyclists Confederation of Canada (www.motorcycling.ca)


9:10 – 9:55 AM Keynote #1: AI and Cybersecurity – A Force Multiplier?
  • Ira Goldstein

    Ira Goldstein is an entrepreneur and cybersecurity expert; he advises on business growth, risk and cybersecurity to public and private sector leaders in his role as CEO of Kernel Advisory. Ira's career has taken him from leading complex security programs to executing dozens of mergers and acquisitions and hundreds of technical projects across a wide range of sectors with companies around the world. He previously served as the Chief Operating Officer of Herjavec Group, a company which he helped build over more than a decade into a global cybersecurity provider, that was acquired by Apax Partners. Ira is a published thought leader specializing in emerging business trends in security, privacy and identity. He is an active member on corporate boards, including as the Executive Chairman of UltraViolet Cyber; board director for Flare, a digital footprint security software, and Carbide, a security and compliance automation platform. Ira also serves in a volunteer capacity as a board director of the Rogers Cybersecure Catalyst at Toronto Metropolitan University, and as a board director for United for Literacy, Canada's largest literacy organization. He is a proud father and husband who resides in Toronto.


10:00 – 10:45 AM Panel #1: How AI and Technology are Partnering to Deal with Current Cybersecurity Challenges
  • Dave Millier, Moderator

    Dave Millier is a Serial Entrepreneur, Off-road Motorcycle Rider & Food Lover. Dave has been involved in cybersecurity for over 20 years. In 2001 he founded an InfoSec company, Sentry Metrics, building one of Canada’s most successful MSSPs before selling the company in 2014. After the sale, Dave’s lifelong passion for reading led him to finally sit down and write his first book, Breached!

    In late 2014, Dave launched Uzado (www.uzado.com), a Cloud-based InfoSec company focused on helping companies simplify Cybersecurity by answering the questions “what now?” or “what next?”. Dave is also the CSO of Quick Intelligence (www.quickintel.com) , a boutique VAR and cybersecurity consulting company, and is the CEO of MIDAC Solutions (www.midac.ca), a Managed IT services provider focused on small to mid-size clients. Dave recently launched Canada Rides (www.canadarides.com) , an off-road motorcycle training company headquartered in beautiful Simcoe County, providing off-road motorcycle and ATV safety training. Dave lives in Ontario with his wife Maria and their two cats.

    In his spare time, Dave volunteers with the Ontario Federation of Trail Riders (www.oftr.ca) and is the Chairperson for the Motorcyclists Confederation of Canada (www.motorcycling.ca)


  • Christopher Fielder

    Field CTO

    Artic Wolf

     



  • Bhojraj Parmar

    Security Consulting Manager

    Mandiant Consulting

    Bhojraj Parmar is a manager at Mandiant Consulting, where he works with executives across governments and critical, national infrastructure organizations.

    Before joining Mandiant in 2019, Bhojraj led cyber security for the largest electricity and gas distributor and smart meter infrastructure provider in New Zealand with a growing presence in Australia.

    He’s worked in the IT industry for 21 years, the last 14 of which focused in cyber security, helping establish and implement security programs and responding to cyber crisis events across Government, Non-Profit, Energy and Finance sectors.


  • Advait Deodhar

    Vice President of Americas Sales Engineering

    ForgeRock

    Advait Deodhar is a certified information systems security professional (CISSP) and has been in the Identity and Access Management space for 19 years. He is VP of a team of ForgeRock Solution Architects, whose goal is to understand a customer’s identity-related business initiatives, map them to technical capabilities, and architect solutions that deliver an insightful solution to address those business requirements. Advait has helped deliver successful and innovative identity and security solutions to Fortune 100 companies address varying challenges across many different industries.


  • Corey Smith

    Vice President, Solutions Architect

    Qualys

    As the Vice President of Solution Architecture, and the head of the Global Center of Excellence for Qualys, Corey Smith provides thought leadership and strategic direction to some of Qualys largest accounts as well as leading a team of security architects who provide technical expertise in areas such as DevSecOps, Cloud, Container, and EDR/XDR. Mr Smith has been in the cyber security space since 1998 with positions in support, consulting and security architecture at companies such as Symantec, CyberArk, Expanse, and Qualys.


10:45 - 11:05 AM Networking Break
11:10 AM – 12:00 PM Keynote #2: Harnessing AI to Detect Stealthy Attacks Hiding in the Multi-Cloud Chaos
  • Ezz Tahoun

    Ezz Tahoun is a distinguished cyber data scientist, who won awards at Yale, Northwestern and Princeton universities as well as prizes from CCCS, CSE, Microsoft, Trustwave and PIA. During his PhD studies in Univ of Waterloo, he had authored 19 papers, 4 open source projects, and was a reviewer for top conferences. He led innovative security projects for Royal Bank of Canada, Orange, Canarie, Huawei, Forescout, various governments, and others. He holds the following certifications: GIAC Advisory Board, GCIH, GSEC, GFACT, CEH, CISM, CRISC, PMP, GCP Prof Cloud Architect, and was an Adjunct Professor of Cyber Security.


12:00 - 1:10 PM Lunch
1:15– 2:00 PM
Keynote #3: What’s New in Cloud and Cybersecurity, Tactics and Techniques

Organizations everywhere have assets in the cloud or are drafting cloud strategies, but there are many things to keep in mind in managing a cloud computing environment. Cloud environments may be easy to set up but often the important details of audit, vendor management, compliance, and much more, are overlooked. Privacy laws have companies asking where their data resides. Companies must ensure the correct vendors agreements are in place, requiring rights to audit and compliance with legal and regulatory obligations. Organizations should clearly define vendor roles and responsibilities and ensure there are no gaps in key assignments in managing the security of the shared environment. If your organization is considering cloud computing or has one in place, we will discuss the multitude of considerations across the entire cloud life cycle.

  • Dr. Lisa McKee

    Dr. Lisa McKee is a Founding Partner at American Security and Privacy, LLC. She has over 20 years of industry experience and provides virtual Data Protection Officer (vDPO) services including assessments, training, program development and leadership for companies internationally. Dr. McKee completed a Ph.D. in Cyber Defense with a dissertation in Privacy from Dakota State University. She is a highly regarded privacy expert and a regular featured speaker and keynote at global events including IAPP, ISACA, IIA and RSA. Dr. McKee is a member of the Accredited Standards Committee X9 providing input on industry standards and an APMG ISACA Certified Trainer. She is passionate about privacy and volunteers on boards for several professional groups, mentors, and teaches graduate students as an adjunct professor at several universities. She is the author of several publications and a Data Privacy Management textbook.


2:00 – 2:45 PM Panel #2: Equipping Cybersecurity and IT Staff to Work With AI
  • Ali Abbas Mehboob Hirji, PhD, Moderator

    With over 16 years of experience, Ali has been a driving force in team development and leadership across various phases of the IT development lifecycle. His career milestones include pioneering the expansion of Durham College’s Cybersecurity Innovation Center and the establishment of their cutting-edge AI and Cybersecurity labs. Ali's leadership was pivotal in deploying applications and infrastructure aligned with ISO 27001 and NIST frameworks, while also crafting processes for SOC 2 level clearances.

    Ali's career trajectory features senior roles at the Ontario Research and Innovation Optical Network (ORION). He spearheaded projects focused on remote connectivity, technical training implementation, and improved access to critical applications. Leading teams of up to 65 professionals, Ali's profound expertise in the cyber domain has earned him a province-wide reputation for his leadership and innovation.

    Notably, Ali's influence stretches beyond his professional roles. He is a distinguished host of various tech shows, including the renowned Power Hour, and a sought-after panelist for esteemed forums such as the CISO Forum Canada. Ali's instructional prowess is evident through his roles as a highly respected lecturer at numerous institutions throughout Canada, where he imparts his extensive knowledge.

    Ali's impact extends to his role in the cyber community. He has orchestrated the execution of tabletop exercises for the province of Ontario, showcasing his commitment to cyber preparedness. His reputation as an expert has led to consistent invitations to deliver bespoke cyber training programs across diverse sectors.

    In his most recent venture, Ali undertook the leadership of the cyber training division at Youth Employment Services. Here, he spearheaded programming aimed at nurturing and elevating the skillsets of budding cyber enthusiasts. Simultaneously pursuing his PhD, Ali finds fulfillment in lecturing at esteemed institutions such as Seneca College, Georgian College, Toronto School of Management, University of Fredericton, and Algoma University, solidifying his commitment to knowledge dissemination.

    Ali's remarkable journey culminates in his rich Durham College experience, where his pivotal role in advancing the Cybersecurity Innovation Center and steering AI and Cybersecurity labs stands as a testament to his enduring dedication to technological advancement and leadership excellence.


  • Dani Grabois

    Chief Solutions Architect

    Cyera

     



  • Greg Young

    VP of Cybersecurity and Corporate Dev

    Trend Micro

    Greg Young is the Vice President of Cybersecurity and Corp Dev for Trend Micro.

    Prior to joining Trend, Greg was a Research Vice President and analyst with Gartner for 13 years . He advised thousands of companies and government agencies on how to better secure themselves. He led research for network security, threat trends, data center security, and cloud netsec. He was lead author for more than 20 Magic Quadrants for firewall, IPS, WAF, and UTM, and was Conference Chair for 4 Security Summits.

    Greg was CISO for the Federal Department of Communications, served as chief security architect for a security product company, and headed several large security consulting practices.

    As Captain Young, he served in the military police and counterintelligence branch working as a certifier/accreditor at the national authority. Greg received the Confederation Medal from the Governor General of Canada for his work with smart card security.

    He currently is:

    • co-chair for the federal government’s Forum on Digital infrastructure Resilience (CFDIR), and on its Working Groups for AI, and Supply Chain Resilience,
    • on the federal National Cross Sectoral Forum (NCSF) for Critical Infrastructure,
    • appointed by cabinet of the Government of Barbados as a member of their Cybersecurity Working Group, &
    • co-host of the Real CyberSecurity Podcast

    He mentions too often he was an extra in 2 episodes of Airwolf.


  • Curtis Collicutt

    Solutions Engineer

    Sysdig

     



  • Edgar Ortiz

    Director of Solution Architects - East

    Noname

     



2:45 – 3:05 PM Networking Break
3:05 – 3:50 PM
Keynote #4: The Future of AI and Cybersecurity

A concept of AI surpassing human intelligence and disrupting life as we know, an AI apocalypse, has been explored by futuristic novels many times. In the current world, is this still just a fantasy? In the past few years AI has emerged as a transformative force and is integrating its way into every industry and every aspect of a human life. With increasing dependency on this technology, what are the realistic causes for concern?

In this talk, speakers will explore the future of integrating AI technology and impact of cybersecurity in preparation of an AI-driven world. Can lessons of the past prepare us for the future? Join this session to learn about emerging AI threats, challenges and opportunities in the field of AI and cybersecurity.

  • Helen Oakley

    Helen Oakley, CISSP, GPCS, is a Lead Security Architect at SAP’s Global Security team, where she defines the strategy and architecture for software supply chain security, as well as requirements for implementation of security capabilities, driving security-by-design and privacy-by-design architecture across all software at SAP. Artificial Intelligence software is one of the technology categories that Helen addresses as part of her overall role, where security controls must incorporate not only the fundamental principles of application security but also specifics for AL/ML, such as AI model security, training data security and AI software transparency. Helen is working on AI software security research together with her colleagues at SAP, and contributing to AI-related forums by Linux Foundation.

    Aside of her work at SAP, Helen is a Co-Founder of Leading Cyber Ladies - a global professional network for women in cybersecurity. Helen is on an advisory board for several cybersecurity startups where she is providing founders and their teams with guidance on the fast-paced cybersecurity market and industry and advising the C-Suite on their corporate security needs. Helen is an educator and a frequent speaker at various conferences, and she was honored by IT World Canada as Top Canadian Women in Cybersecurity for impactful cybersecurity achievements in the field.

    www.linkedin.com/in/helen-oakley


  • Rhea Michael Anthony

    Rhea Michael Anthony is a Product Security Specialist at SAP's Global Security Team. Her mission is to research and develop robust software product security and secure software development practices that support innovation and champion a security-first culture that impacts products across SAP. She is actively engaged in researching threats and safeguards for developing AI Software, for secure data consumption and secure model, to ensure security at the forefront of AI development. This also includes reviewing and adapting industry standards (eg: OWASP Top 10) and regulatory requirements (eg: EU AI Act) with consideration of SAP's diverse technology and use of open source software.

    With prior experience as an Analytics and Machine Learning programmer, she understands the challenges of development which lends her a unique perspective in bridging the worlds of AI development and Secure Software, with a vision of innovating solutions where security and usability are intricately interwoven.

    Rhea is an Engineer with a Master's Degree from the University of Texas at Dallas in Business Analytics, majoring in Data Science. She is a speaker and advocate for adopting cybersecurity as a way of life in both, business and personal context. In this ever-evolving landscape of technology, she values continuous learning and building strong collaboration with industry peers in fortifying the future of technology.

    www.linkedin.com/in/rhea-michael-anthony


3:50 – 4:00 PM Closing Remarks
4:00 - 5:00 PM Networking Reception

Cloud Security Summit Sponsors

Premium Sponsors

End cyber risk for your organization with the Arctic Wolf Security Operations Cloud and Concierge Delivery Model. Our innovative platform and concierge delivery model enable us to provide better, more cost-effective protection.


A global digital identity leader helping people simply and safely access the connected world. The ForgeRock Identity Platform delivers enterprise-grade identity solutions at scale for customers, employees, and connected devices. More than 1,300 organizations depend on ForgeRock’s comprehensive platform to manage and secure identities with identity orchestration, dynamic access controls, governance, and APIs in any cloud or hybrid environment.


Mandiant is recognized by enterprises, governments and law enforcement agencies worldwide as the market leader in threat intelligence and expertise gained on the frontlines of cyber security. To make every organization confidently ready for cyber threats, Mandiant scales its intelligence and expertise through the Mandiant Advantage SaaS platform to deliver current intelligence, automation of alert investigation and prioritization and validation of security controls products from a variety of vendors.


Noname Security is taking a complete, proactive approach to API Security. Noname works with 20% of the Fortune 500 and covers the entire API security scope across three pillars - Posture Management, Runtime Security, and API Security Testing.


Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of disruptive cloud-based security, compliance and IT solutions with more than 10,000 subscription customers worldwide. The Qualys Cloud Platform and its integrated security solutions continuously deliver critical security intelligence to businesses across their global IT assets.


Powered by Runtime Insights, Sysdig stops threats instantly and reduces vulnerabilities by up to 95%. We created Falco, the open standard for cloud threat detection, and apply Runtime Insights to help you focus on the vulnerabilities and threats that matter most. Prevent, detect, and respond at cloud speed with Sysdig.


At Trend Micro, everything is about making the world a safer place for exchanging digital information.

We help transform cybersecurity from siloes to a unified security platform that accelerates digital transformation, hybrid workforce collaboration, SOC modernization, vendor consolidations, and operationalization of Zero Trust, while integrating with investments and partner ecosystems.


Event Sponsors

The threat landscape is changing. New technologies and evolving threats make cybersecurity more complex and challenging than ever before. Bell understands that your business success and customer trust rely on a solid security foundation. We offer protection against the growing sophistication of advanced threats. With a full suite of managed and professional services, Bell solutions provides insight into the security of your cloud services, data, network and devices.


Lookout Cloud Security Platform is the only cloud-native solution that delivers zero trust security by reducing risk, and protecting your corporate data on any device, any app, any location.

With a centralized dashboard and unified policy framework, Lookout helps you consolidate vendors for endpoint security and cloud security.


Securonix Unified Defense SIEM provides the first and only content-driven threat detection, investigation, and response (TDIR) solution built with a highly scalable data cloud and a unified experience from analyst to CISO. The innovative cloud-native solution enables organizations to scale up their security operations and keep up with evolving threats.