ISE® Canada Private Welcome Dinner
5:30pm - 8:30pm
Hy’s Steakhouse
101-120 Adelaide Street West
Toronto, ON M5H 1T1
Registration
Big Security – Are Enterprise Networks Too Complex to Secure Sufficiently
The cyberspace environment is extremely dynamic with new vulnerabilities and threats emerging daily. The growing complexity of enterprise networks in a global economy compounds the challenge for security leaders, who must develop and employ various offensive and defensive strategies to defend the enterprise and minimize risks while maximizing the value of their investments. Join our discussion to learn how your peers are addressing the growing complexity of enterprise-wide network security, and share your own insights on protecting your enterprise in the evolving threat landscape.
September 10, 2014
10:00am - 7:00pm: Registration
Location: Pre-function area of Grand Ballroom
11:30 AM : ISE Canada Nominee Welcome Luncheon *Invitation Only
Location: Salon III
Sponsored by
David Corlette
Product Manager
NetIQ
When Tinfoil Hats Aren't Enough: Effective Defenses Against Advanced Persistent Threats (APTs) > Download Presentation
You probably know about the threat posed by APTs. You also may know that most experts will tell you that there are no cost-effective ways to completely prevent a determined attacker from getting into your systems. So what to do? Since returning to an agrarian society is likely not a viable option, this presentation will cover common APT techniques and ways to detect those techniques in action and rapidly react. We'll talk about how to leverage the Identity-powered enterprise to improve the accuracy and effectiveness of prevention, detection, and response.
1:00 PM : Welcoming Remarks and Introductions
Location: Salon I & II
Marci McCarthy
CEO and President
T.E.N.
Biography
1:10 PM : Keynote Address
Location: Salon I & II
Della Shea
Chief Privacy and Information Risk Officer
Symcor, Inc.
ISE® Canada Executive Award Winner 2013
Biography
Pro-actively Managing Information Risk Exposures through End-to-End Security Strategies
As security professionals, we understand that organizations that collect, use, store, process and transmit personal and confidential information must have strong security controls and procedures in place to pro-actively protect this information. Three key sources of data privacy risk exposure arise from gaps in physical, logical and procedural controls. This presentation brings together the concepts of taking a holistic approach to integrating controls and procedures from all three sources of vulnerabilities to manage privacy and security risks through the entire data life-cycle.
1:40 PM : Adobe Executive Address
Location: Salon I & II
Lindsey Wegrzyn Rush
Director, Adobe Security Coordination Center
Adobe Systems
Biography
Investment in People is the Key to a Security Organization Built for Change
According to Forrester Research, 51 % of organizations say it’s a challenge or major challenge to hire and keep security staff with the right skills. This becomes especially challenging in a constantly changing organization managing acquisitions, changing business objectives, and rapid growth. While investing in security technology is important to stay ahead of threats, failure to invest properly in your people can introduce systemic and cultural risk that can be more challenging to manage than technical threats. This presentation will discuss the keys to not only getting the best people, but keeping them. Ms. Rush will share Adobe’s experiences in managing this very challenging problem along with what we have learned as we have built up our security organization to adapt to our cloud-focused future.
1:55 PM : Interactive Executive Roundtables
Location: Salon I & II
The Interactive Executive Roundtables brings together ISE® Nominees, industry leaders, invited guests, and sponsor delegates to meet each other and join in interactive discussions on key industry issues as well as share best practices. The interactive roundtable discussions are hosted by our ISE® Judges and Nominees.
Janos Drencsan
Information Security Officer
BMO Financial Group
Assurance over Third Party Security, Risk Management, and Control Effectiveness
Nearly all businesses can now be viewed as extended enterprises that employ a huge variety of third-party software. Critical functions are often completed by the supply chain. For many organizations, third parties and sometimes fourth parties (sub-contractors) are the most vulnerable risk carriers. As network perimeters have hardened, cyber criminals are increasingly targeting the IT supply chain, which is often the path of least resistance. In the wake of the Target breach, enterprises are realizing that they need to hold their suppliers to the same security standards for which they hold themselves. Join this discussion to discuss your approach to protecting the supply chain and gain insight from your peers regarding new strategies for managing third party risk and reducing cost of oversight.
Storming the CASL – What is Your Strategy?
Touted as one of the strictest, most aggressive anti-spam laws in the world, Canadian Anti-Spam Legislation took full effect on July 1, 2014. Stringent standards with very few exemptions will require implied or direct consent and violations could cost your company millions. Not only are the fines potentially steep, companies that intentionally mislead recipients with false sender information could potentially face criminal charges. Join this conversation to discuss now the new legislation has affected your information security and auditing efforts and learn how others are addressing compliance in one of the world’s most highly restricted email environments.
Security vs Risk vs Privacy: Who Leads the Charge?
As the field of security has evolved, so has the role of the Chief Information Security Officer, but debates are heated regarding exactly what responsibilities this title-bearer should assume. Although the classic model calls for a CISO with a strong technical background to manage enterprise level security efforts, many global organizations have shifted from a focus on information security programs to a holistic risk management approach, which calls for a more business savvy CISO. Others have found combining their privacy and security teams under single leadership can help to manage risk. Others still see security, risk and privacy as vital roles that merit their own c-suite members. What’s the best model? Join our conversation to debate the merits for the CISO as a risk and privacy officer and share your insight about the evolution of the CISO role.
2:55 PM : Break
3:05 PM : Nominee Showcase Presentation #1
Location: Salon I & II
3:25 PM: CISO Deep Dive: Executive Leadership
Location: Salon I & II
An industry cross section of ISE Alumni and leading security executives explore today’s hottest security trends and issues and the key challenges they are facing now and in the future.
Moderator
Bobby Singh
VP, Chief Information Security Officer
TMX Group Limited
ISE® Canada People's Choice Award Winner 2013
Biography
Panelists
Kenneth Haertling
VP & Chief Security Officer
TELUS
ISE® Canada Executive Award Finalist 2013
ISE® North America Executive Award Winner 2014 - Commercial Category
Biography
Bruce Jones
Chief Information Security Officer
Eastman Kodak Company
ISE® North America Commercial Executive Award Finalist 2008
Biography
John Schramm
Global Head of IT Risk and Security
MunichRE
ISE® North America Executive Award Finalist 2014 - Financial Category
Biography
4:10 PM : Nominee Showcase Presentation #2
Location: Salon I & II
4:30 PM : Nominee Showcase Presentation #3
Location: Salon I & II
4:50 PM: Late Afternoon Break
5:00 PM : VIP Reception (invitation only)
Location: Ballroom 1
ISE® Nominees, sponsors and special guests will have the opportunity to network in a private setting with beverages and appetizers.
6:00 PM : Sponsor Pavilion and Dinner Buffet
Location: Grand Salon
Guests enjoy gourmet dinner while networking and meeting the sponsors. Honoring and celebrating the Canada Award Nominees for 2013, this exciting occasion will bring together top security executives to recognize the individuals who have made significant and positive impact on their organizations through exemplary performance.
7:30 PM : ISE® Canada Awards Gala
Location: Grand Ballroom
Honoring and celebrating the ISE® Canada Award Nominees, this exciting occasion will bring together top security executives to recognize the individuals and the project teams who have made significant and positive impact on their organizations through exemplary performance.
9:00 PM : Champagne and Dessert Reception
Location: Grand Salon
Enjoy champagne and dessert while celebrating the winners, nominees and project teams. Don't miss the Passport for Prizes drawing and a chance to win outstanding gifts from our ISE® Canada Sponsors.