+ All Categories
Home > Documents > Brochure - Jan 14

Brochure - Jan 14

Date post: 16-Jan-2017
Category:
Upload: dominic-vogel
View: 67 times
Download: 0 times
Share this document with a friend
11
CI CYBER SECURITY SUMMIT WEST CI March 1, 2016 | Marriott Downtown | Calgary An Invitation-Only Interactive Cross-Sector Event, Gathering Senior-Level Leaders in Cyber Security a C5 Group Company Business Information in a Global Context CI Connect’s interactive Cyber Security Summit West, is a premier forum that will bring together Cyber Security leaders to engage and collaborate on the future of Cyber Security in our new and Interactive Roundtable (IRT) format. Learn up-to-the minute information and critical strategies your organization needs to optimize security initiatives. Brian Hamilton Director, Compliance and Special Investigations Office of the Informa- tion and Privacy Com- missioner, Alberta Ray Boisvert Senior Associate Hill + Knowlton Strategies Curtis Levinson United States Cyber Defense Advisor to NATO Vice President Centre for Strategic Cyberspace + Security Science (CSCSS) Paul Piotrowski Senior PCD Security Strategist, APAC Region, Shell Canada Join Subject-Matter Experts, Including: 1-877-927-7936 | CanadianInstitute.com/CybersecurityWest COLLABORATE | ENGAGE | EMPOWER
Transcript
Page 1: Brochure - Jan 14

CI CYBER SECURITY SUMMIT WEST

CI

March 1, 2016 | Marriott Downtown | Calgary

An Invitation-Only Interactive Cross-Sector Event, Gathering Senior-Level Leaders in Cyber Security

a C5 Group CompanyBusiness Information in a Global Context

CI Connect’s interactive Cyber Security Summit West, is a premier forum that will bring together Cyber Security leaders to engage and collaborate on the future of Cyber Security in our new and Interactive Roundtable (IRT) format. Learn up-to-the minute information and critical strategies your organization needs to optimize security initiatives.

Brian HamiltonDirector, Compliance and Special InvestigationsOffice of the Informa-tion and Privacy Com-missioner, Alberta

Ray BoisvertSenior AssociateHill + Knowlton Strategies

Curtis LevinsonUnited States Cyber Defense Advisor to NATO Vice PresidentCentre for Strategic Cyberspace + Security Science (CSCSS)

Paul PiotrowskiSenior PCD Security Strategist, APAC Region, Shell Canada

Join Subject-Matter Experts, Including:

1-877-927-7936 | CanadianInstitute.com/CybersecurityWest

COLLABORATE | ENGAGE | EMPOWER

Page 2: Brochure - Jan 14

1-877-927-7936 | CanadianInstitute.com/CybersecurityWest

CYBER SECURITY SUMMIT WEST

CI

March 1, 2016 | Marriott Downtown | Calgary

a C5 Group CompanyBusiness Information in a Global Context

COLLABORATE | ENGAGE | EMPOWER CI Connect’s interactive Cyber Security Summit West, supported by a host of leading experts, promises to deliver, up-to-the-minute information and critical strategies your organization needs to optimize security initiatives.

CI Connect events are by invitation-only and boast a unique format, ensuring that every participant interacts with a select group of peers, subject matter experts and solution providers through our ‘Interactive Roundtable’ (IRT) format.

Senior executives involved in cyber security in energy, utilities, government, finance, ICT, transportation, law enforcement and the health sectors, will gather to focus on the biggest challenges in cyber security:

• Cloud Security: As cloud storage grows in popularity at an unprecedented pace, it has simultaneously created new cyber security risks and challenges. Examine these risks and pinpoint the areas of concern to ensure your organization is safeguarded against this emerging threat.

• Third Party Provider Threats: In recent news, we’ve witnessed how major organizations’ connection to third party vendors can open backdoors for hackers to infiltrate an enterprise’s network. How are companies developing a vendor management plan to bolster internal security?

• Incident Response: Different breaches require different responses – identify the type of cyber security incident response capability you need and the level of support your specific system requires.

• Insider Threats: How are organizations taking inventory of data paths within the organization to adjust access allowances and ensure maximum protection against intentional or unintentional insider threats?

• BYOD: The acceptance of “bring your own device” allows for increased productivity and decreased enterprise costs. Explore best practices that allow employees to securely and easily access corporate data on their own device.

• Information Sharing: Recognize the growing need for information sharing initiatives between organizations and advancing regulations to help protect Canada’s critical infrastructure.

RESEARCHED AND DESIGNED FOR:• CIOs

• CTOs

• CISOs

• Chief Executives

• Heads of IT/Cyber Security

• Directors of IT/Cyber Security

WHAT YOU’LL FIND IN THIS BROCHURE:

• Agenda

• Top 5 Reasons to Attend

• Interactive Roundtable (IRT) Sessions

• Speaker Bios

• Interactive Roundtable (IRT) Format Explained

• How to Apply

• Registration Fee

• Sponsorship Opportunities

Apply to be part of these critical cyber security discussions in 2016.

Page 3: Brochure - Jan 14

1-877-927-7936 | CanadianInstitute.com/CybersecurityWest

CYBER SECURITY SUMMIT WEST

CI

March 1, 2016 | Marriott Downtown | Calgary

a C5 Group CompanyBusiness Information in a Global Context

8:20

Opening Remarks from Chair Curtis Levinson, United States Cyber Defense Advisor to NATO Vice President Centre for Strategic Cyberspace + Security Science (CSCSS)

8:30

Examining the Latest and Next Generation Threats Targeting Canada’s Critical InfrastructureRay BoisvertSenior AssociateHill + Knowlton Strategies

• Separate propaganda and explore the current and emerging threats targeting the country’s critical infrastructure and understanding the damage they can inflict

• Identify which sectors are most at risk and examine the most likely attack sources

• Understand and apply lessons learned from recent attacks on global critical infrastructure

9:00

Optimizing National Cyber Security ResourcesDavid SwanExecutive Vice President, Defense Intelligence GroupCentre for Strategic Cyberspace + Security Science (CSCSS)

• Identify and explore the cyber security programs currently available to industry, including leveraging current government-based aid

• Compare the resources available in Canada to those in other countries: How does Canada stack up?

• What developments need to happen to strengthen cyber resiliency and safeguard critical infrastructure?

9:30

IRT Discussion 1 & 2

Moderated by a cyber-security expert, participate in an informal, dynamic discussion with your counterparts focusing on one aspect of cyber security. Garner insights from the experiences of security leaders which can be integrated into an actionable plan for your organization.

10:50

Networking Break

Ag

end

a 11:10

Safeguarding the Interconnected Global Supply Chain from Cyber VulnerabilitiesCurtis LevinsonUnited States Cyber Defense Advisor to NATO Vice PresidentCentre for Strategic Cyberspace + Security Science (CSCSS)

• Expose and understand the multitude of cyber hazards that threaten the digital supply chain

• Debate whether the benefits of interconnectedness outweigh the information technology risks

• Establish a competent internal review framework for assessing and limiting supply chain risks and ensure security initiatives are embedded into the life cycle of the vendor-management contract

11:40

IRT Discussion 3 & 4

Moderated by a cyber-security expert, participate in an informal, dynamic discussion with your counterparts focusing on one aspect of cyber security. Garner insights from the experiences of security leaders which can be integrated into an actionable plan for your organization.

1:00

Networking Luncheon

Page 4: Brochure - Jan 14

1-877-927-7936 | CanadianInstitute.com/CybersecurityWest

CYBER SECURITY SUMMIT WEST

CI

March 1, 2016 | Marriott Downtown | Calgary

a C5 Group CompanyBusiness Information in a Global Context

2:00

Seamless Discipline Integration and Inter-Departmental CollaborationDominic VogelIndependent Cyber Security Contractor

• Overcome obstacles and break down silos in order to achieve an effective organization-wide cyber defence strategy

• Understand how effectively bridging security gaps can increase organizational resiliency and optimize cyber security

• Identify innovative strategies for ensuring seamless collaboration between key departments in your organization

2:30

IRT Discussion 5 & 6

Moderated by a cyber-security expert, participate in an informal, dynamic discussion with your counterparts focusing on one aspect of cyber security. Garner insights from the experiences of security leaders which can be integrated into an actionable plan for your organization.

4:00

CLOSING PANEL Exposing Cyber Vulnerabilities in Industrial Control Systems (ICS) and Implementing Preventative Risk Management StrategiesPierre Janse van Rensburg SCADA Security SpecialistENMAX Power Corporation

Hani MansiDirector, Risk and Information SecurityATCO

Paul PiotrowskiSenior PCD Security Strategist, APAC RegionShell Canada

• Explore recent global attacks on critical industrial control systems and examine innovative strategies for increasing cyber resiliency for process and control systems

• Understand the fragility and vulnerability of these systems within the country’s critical infrastructure sectors

• Address the challenge of patch attempts on systems that are designed to be online without disruption

4:30

Closing Remarks from Conference Chair Conference Adjourns

1. Connect personally with Canada’s leaders in cyber security – discuss common challenges and engage in high-level strategic conversations with similar peers

2. Examine the latest threats targeting Canada by learning what to expect and how to prepare for the next five years of cyber-attacks

3. Gain insight into effectively planning, preparing and responding to cyber incidents in order to minimize damage

4. Explore the newest risks associated with Cloud Security and third-party provider vulnerabilities

5. Understand the critical components of an effective insider threat risk management program

TOP 5 REASONS TO ATTEND:

Ag

end

a

Page 5: Brochure - Jan 14

1-877-927-7936 | CanadianInstitute.com/CybersecurityWest

CYBER SECURITY SUMMIT WEST

CI

March 1, 2016 | Marriott Downtown | Calgary

Topic 1

Incident Response: Reacting to Cyber Security Incidents

• Identify the type of cyber security incident response capability you require and the level of support you need for your specific system

• Determine the ways to respond to these attacks in a fast, effective and comprehensive manner

• Understand your organization’s “state of readiness” to respond to a cyber-security incident

Subject Matter Expert

Brian Hamilton Director, Compliance and Special InvestigationsOffice of the Information and Privacy Commissioner, Alberta

Solution Provider

Sponsorship opportunity is available for this Roundtable Discussion Topic. Contact our Sponsorship Team if you are interested in hosting this table.

Topic 2

Cloud Security: Practical Considerations for Maximizing Cyber Resilience on the Cloud

• Examine and understand the cyber risks associated with sharing IP assets on the cloud with third parties

• Identify the specific types of data that can be securely stored on the cloud and pinpoint emerging areas of concern

• Explore current industry cloud standards and verifiable security protocol

Subject Matter Expert

Contact us if you are interested in hosting this Interactive Roundtable (IRT) session.

Solution Provider

Sponsorship opportunity is available for this Roundtable Discussion Topic. Contact our Sponsorship Team if you are interested in hosting this table.

IRT

Dis

cuss

ion

To

pic

s

Page 6: Brochure - Jan 14

1-877-927-7936 | CanadianInstitute.com/CybersecurityWest

CYBER SECURITY SUMMIT WEST

CI

March 1, 2016 | Marriott Downtown | Calgary

Topic 4

Third Party Provider Threats and Risk Management

• Clearly defining the issues organizations should consider in seeking to mitigate your cyber security risk in connection with third party service providers

• Develop a vendor management plan

• Bolster your internal security

Subject Matter Expert

Contact us if you are interested in hosting this Interactive Roundtable (IRT) session.

Solution Provider

Sponsorship opportunity is available for this Roundtable Discussion Topic. Contact our Sponsorship Team if you are interested in hosting this table.

Topic 3

Proactive and Compliant Insider Threat Mitigation

• Clearly define “Insider Threat” and understand why this type of threat is increasing in frequency

• Take inventory of current data paths within the organization and adjust access allowances to ensure maximum protection

• Evaluate the effectiveness of available monitoring tools and ensure compliance with legal risks

Subject Matter Expert

Contact us if you are interested in hosting this Interactive Roundtable (IRT) session.

Solution Provider

Sponsorship opportunity is available for this Roundtable Discussion Topic. Contact our Sponsorship Team if you are interested in hosting this table.

IRT

Dis

cuss

ion

To

pic

s

Page 7: Brochure - Jan 14

1-877-927-7936 | CanadianInstitute.com/CybersecurityWest

CYBER SECURITY SUMMIT WEST

CI

March 1, 2016 | Marriott Downtown | Calgary

Topic 5

BYOD: Data Protection and Information Security Issues

• Create a BYOD business policy

• Learn which type of corporate data can be processed on personal devices

• Explore best practices to store and delete corporate data on personal devices

Subject Matter Expert

Contact us if you are interested in hosting this Interactive Roundtable (IRT) session.

Solution Provider

Sponsorship opportunity is available for this Roundtable Discussion Topic. Contact our Sponsorship Team if you are interested in hosting this table.

Topic 6

Information Sharing as a Collaborative Approach to Safeguarding Critical Infrastructure

• Recognize the growing need for information sharing initiatives and advancing regulations to help protect Canada’s critical infrastructure

• Learn best practices for information sharing between organizations in the same sector, as well as between those in different sectors to open the lines of communication

• Examine and evaluate current information sharing networks to learn challenges, outcomes, and opportunities

Subject Matter Expert

Kathy MacdonaldSecurity ProfessionalRetired Calgary Police

Awarded Governor General’s Member of the Order of Merit of the Police Forces (M.O.M.)

Solution Provider

Sponsorship opportunity is available for this Roundtable Discussion Topic. Contact our Sponsorship Team if you are interested in hosting this table.

IRT

Dis

cuss

ion

To

pic

s

Page 8: Brochure - Jan 14

1-877-927-7936 | CanadianInstitute.com/CybersecurityWest

CYBER SECURITY SUMMIT WEST

CI

March 1, 2016 | Marriott Downtown | Calgary

Subject Matter Expert

Ray BoisvertSenior AssociateHill + Knowlton Strategies

As President of I-Sec Integrated Strategies, Ray Boisvert works with a variety of client organizations to help them gain a deeper understanding of intelligence and security matters in a global context, and the impact on their operating environments.

He delivers business intelligence solutions, consults on Mergers and Acquisitions with national security complexities, and guides resilience building, particularly in the areas of Cyber Security and Insider Threats.

After five years with the RCMP, Ray joined the Canadian Security Intelligence Service (CSIS) in 1984 and retired as Assistant Director, Intelligence in 2012. During his tenure, Ray was involved in broad facets of security intelligence operations - from leadership of the Counter Terrorism domain, to Operational Risk Management, Data Exploitation programs, Human Source management, Foreign Collection and Special Operations.

Subject Matter Expert

Brian Hamilton Director, Compliance and Special InvestigationsOffice of the Information and Privacy Commissioner, Alberta

Brian Hamilton is Director, Compliance and Special Investigations at the Office of the Information and Privacy Commissioner (OIPC) of Alberta. His team investigates potential offences under Alberta’s privacy laws, reviews privacy impact assessments and is responsible for privacy breach response. Prior to his current appointment Brian served as Health Information Act Director and as an Investigator at the OIPC. In 10 years with the OIPC, he has conducted precedent-setting investigations involving data encryption, biometric identification, malware, business continuity and was the lead investigator on Alberta’s first successful privacy offence conviction.

Previously, Brian was Manager, Privacy and Security at Alberta Health and Wellness where he led efforts to ensure that Alberta’s heath sector met minimum information security standards and developed a privacy and security audit framework for the health sector. Brian is a past Instructor with the University of Alberta’s Information Access and Privacy Program. Before moving to Alberta, Brian held positions in the New Brunswick public service.

Subject Matter Expert

Pierre Janse van Rensburg SCADA Security SpecialistENMAX Power Corporation

Pierre Janse van Rensburg has 20+ years of broad ranging IT experience in multiple roles and disciplines, including college instructor, network engineer, developer, product manager and system specialist.

He has worked in both the public and private sector from small start-ups to large enterprises and has been supporting utility operations for over a decade now focusing on OT (Operational Technology) security for the past 8 years.

Pierre is responsible for day-to-day operational security of the SCADA network and coordinating the creation of the CIP standards compliance program for the T&D operations.

Par

tici

pan

t B

ios

Page 9: Brochure - Jan 14

1-877-927-7936 | CanadianInstitute.com/CybersecurityWest

CYBER SECURITY SUMMIT WEST

CI

March 1, 2016 | Marriott Downtown | Calgary

Subject Matter Expert

Curtis Levinson United States Cyber Defense Advisor to NATO Vice President Centre for Strategic Cyberspace + Security Science (CSCSS)

Dr. Curtis Levinson has over 25 years of focused advisory experience in Cyber Security, Information Governance, Cloud Computing, Regulatory Compliance and Continuity of Operations. He is a highly experienced advisor, risk assessor and technology architect specializing in all phases of the security engineering process.

Dr. Levinson has served with distinction, two sitting Presidents of the United States, two Chairman of the Joint Chiefs of Staff, and the Chief Justice of the United States. He has been selected by the United States to serve as the US Cyber Defense Advisor to NATO.

Dr. Levinson is a frequent consultant, author and lecturer, within the United States and internationally, on a variety of topics related to secure technology, telecommunications, regulatory compliance, counter-terrorism and homeland security. He is an adjunct lecturer for many graduate programs in cyber security and counter-terrorism and a member of the Capitol Technology University Board of Trustees.

Subject Matter Expert

Kathy MacdonaldSecurity ProfessionalRetired Calgary Police

Passionate and hardworking with over two decades of experience in security and law enforcement, Kathy is an internationally recognized voice in the area of cybercrime prevention, online abuse, cyberbullying, identity crime and privacy protection. Kathy currently serves on the Board’s of ISC(2) Alberta Chapter and Common Sense Calgary. She is also an Industry Attaché for Stop. Think. Connect., a global messaging convention unifying the response to cybercrime worldwide.

Kathy is a published writer, media spokesperson and a guest speaker at hundreds of local and international conferences. In 2009, Kathy was Invested with the Governor General of Canada Award, Member of the Order of Merit of the Police Forces (M.O.M.), for her work serving the community in the area of cybercrime awareness.

Subject Matter Expert

Hani MansiDirector, Risk and Information SecurityATCO

Mr. Hani Mansi has focused his career on the creation, management and optimization of Information Security and Cyber-security Programs. In doing so, Mr. Mansi has fulfilled the role of Chief Information Security Officer (CISO).

Over the past twenty five years, Mr. Mansi has participated in Operational and Enterprise Risk Management committees and provided updates to the Audit Committee of the Board of Directors.

Mr. Mansi’s portfolio of responsibilities includes but is not limited to implementing and maintaining risk management, policy creation, governance, strategy, and compliance practices. Currently, Mr. Mansi is the Director of Risk and Information Security for the ATCO Group of Companies.

Par

tici

pan

t B

ios

Page 10: Brochure - Jan 14

1-877-927-7936 | CanadianInstitute.com/CybersecurityWest

CYBER SECURITY SUMMIT WEST

CI

March 1, 2016 | Marriott Downtown | Calgary

Subject Matter Expert

David SwanExecutive Vice President, Defense Intelligence GroupCentre for Strategic Cyberspace + Security Science (CSCSS)

David Swan is a CSCSS Executive Vice President and leads the CSCSS Defence Intelligence Group (C/DIG) which focuses on transnational / International threats against nations including infrastructure and strategic industries.

David’s working career spans a dynamic technical background and service in the Canadian Military Reserve. Twice employed as a Chief Technical Officer (CTO), he experienced attempts to acquire his company’s Intellectual Property (IP). Since 2009 he has provided specialized computer security consulting including cyberintelligence and geopolitical analysis.

In the Canadian military, David enjoyed success as: a Naval Communicator, a Naval Officer (Operations) and an Army Intelligence Officer. His assignments included work on a number of military computer systems. David continued to contribute to the Army at the Unit, and Brigade levels until he retired in 2013. David’s military career has included work with U.S. military (Coast Guard, Navy and USMC), U.K. (Navy and Army) and NATO.

Subject Matter Expert

Dominic VogelIndependent Cyber Security Contractor

Dominic Vogel has an established track record of forming positive security cultures and has been intimately involved with IT Security in organizations of all sizes. He has a wide-range of experience having served critical roles in numerous projects including creating security strategy, policy development, endpoint security, and threat management in a multitude of industries (financial services, logistics, transportation, and government just to name a few).

Having worked within large and globally diverse organizations he has extensive security experience that has been forged over the past decade as an information security professional.

Dominic is well regarded as a skilled communicator having been a security blogger for the renowned IT website TechRepublic. He has performed as a keynote speaker for Blancco Canada Security Days, Vancouver IEEE Career Day, Delta Chamber of Commerce, NYIT Vancouver Cyber Security Symposium, Vancouver Enterprise Forum, and Vancouver ISACA.

Par

tici

pan

t B

ios

Subject Matter Expert

Paul PiotrowskiSenior PCD Security Strategist, APAC RegionShell Canada

Paul is currently a Global Process Control Domain IT Security Technical Authority for operating assets and capital projects at Royal Dutch Shell. He has over 15 years of IT Security experience and has travelled extensively internationally during his career with Shell.

He holds several certifications including the GICSP (Global Industrial Cyber Security Professional) and CISSP. He is locally based out of the Calgary Shell office.

Page 11: Brochure - Jan 14

1-877-927-7936 | CanadianInstitute.com/CybersecurityWest

CYBER SECURITY SUMMIT WEST

CI

March 1, 2016 | Marriott Downtown | Calgary

HOW TO APPLYCI Connect events are by invitation only. If you are a senior executive involved in cyber security in energy, utilities, government, finance, ICT, transportation, law enforcement or the health sectors, please request an application to attend this event.

To apply or to suggest a subject matter expert to host an Interactive Roundtable Topic, contact:

Yuga PremDirector Delegate Sales1-877-927-0718 ext. [email protected]

You will be notified within 1-3 business days of receiving your application if you have been accepted.

REGISTRATION FEEThe cost of registration is $995. If you have been approved to attend, we will send you a registration email with conference and billing information.

SPONSORSHIP OPPORTUNITIESTo suggest a solution provider to host an Interactive Roundtable Topic, contact:

Dan Gellman Director of Sponsorship 1-877-927-0718 ext. 7389 [email protected]

ParticipantsTopic

Subject Matter Expert(Host)

Solutions Provider(Host)

Interactive Roundtable Discussions (IRT)

Topic 1Reacting to Cyber Security Incidents

Topic 2Practical Considerations for Maximizing Cyber Resilience on the Cloud

Topic 3Proactive and Compliant Insider Threat Mitigation

Topic 4 Information Sharing as a Collaborative and Dedicated Approach to Safeguarding Critical Infrastructure

Topic 5BYOD: Data Protection and Information Security Issues

Topic 6Third Party Provider Threats and Risk Management

IRT Rotation Depicted

INTERACTIVE ROUNDTABLE (IRT) FORMAT EXPLAINED: • Participants are divided into designated groups

• Each group visits every table for a 40-minute discussion

• Each table is moderated by a subject expert and solution provider, featuring a different discussion topic

• After each 40-minute discussion, each group follows the directional arrow to the next IRT and has a new conversation on a new topic

• Keynote presentations and panels break-up the day between IRT rotations

WHY YOU’LL LOVE THIS FORMAT:• Interact with leading subject-matter

experts in cyber security

• Escape ‘death’ by PowerPoint

• Participate in an intimate group setting to stimulate high-level strategic discussions

• Learn with peers to share similar challenges and issues


Recommended