Day One : Wednesday, July 29, 2020

10:00 EDT

10 min

Welcome and Opening Remarks from the Chair

11:10 EDT

60 min
Ferris Adi

Optimizing the future, The 5G & IOT Revolution: Here's What To Expect

Ferris Adi, Senior Security & Compliance Manager, Rogers Communications

  • 5G is a next-generation mobile network technology that can enable an astonishing range of innovative new products and services and offers the promise of significant economic and social benefits as well. However, like many emerging technologies, it is equally likely to disrupt multiple industries
  • The arrival of 5G and the growth of IoT devices are guaranteed to affect the cybersecurity landscape, it is so imperative that companies proactively assess their security strategies and data security
  • 5G also introduces critical concerns around data security and  privacy that Cyber Security and Privacy  professionals need to understand, mitigate and manage.
  • This session will establish a clear understanding of the essentials around 5G & IOT  from a privacy and security perspective
  • This  session will discuss why deploying a risk-based approach to security will be critical, ensuring that high-risk areas are seen as the biggest priority, in order to minimize damage

12:10 EDT

60 min


13:10 EDT

60 min
Mahmoud Mussa

Cybersecurity Tips for Working Remotely

Mahmoud Mussa, Senior Cybersecurity Analyst, Indigo

When you work in the office, you benefit from the security measures that your organization has in place to protect its networks, systems, devices, and information from cyber threats. Working remotely provides flexibility and convenience. However, remote work can weaken your organization’s security efforts and put you at risk if you don’t take precautions. Read through our cyber security tips to ensure that you are practicing good cyber hygiene when working from home, a café, or any other public location

Focusing on the current pandemic of COVID-19 that’s we all we all are going through. There will be common risks and threats involved in our business as usual activities considering the current situation scenarios where most of the business operations are being held remotely and it involves a risk of data breach or leakage more than before

  • General security practices for working remotely
  • Cyber security threats and social engineering
  • Ensuring secure working environment everywhere

14:10 EDT

20 min


14:30 EDT

60 min
Jon Rohrich

Redefining the Security Perimeter: Why Protecting Identities is More Important Than Network Security

Jon Rohrich, Security & Compliance Technical Specialist, Microsoft

  • Digital transformation, the cloud and working remotely have made the traditional perimeter-based network defense obsolete. In these unprecedented times, forcing remote users through internal Network infrastructure creates performance bottlenecks and often does more harm than good.
  • Strong Information Security teams operate with an “assume breach” mentality making a VPN connection no longer enough to assure secure access of apps and data. Enter the Zero-Trust security model.
  • With the proliferation of SaaS applications, mobile devices and cloud services, the security perimeter has been redefined. “Never Trust, Always Verify” is the new mantra in which just enough access is granted to strongly authenticated identities on secure, compliant devices in verified locations. These modern security concepts are what makes Identity and Access Management so important, and why identity must be recognized as a modern security perimeter.
  • Attendees will learn about the prevalence of identity based attacks, the history and current state of Zero Trust and how they can protect their users by applying modern security principles around their identities and data. Topics covered in this session are especially important as more organizations have shifted to a work from home model due to the recent Covid-19 pandemic

15:30 EDT

60 min

Cloud Security Breaches: Case Studies, Best Practices & Lessons Learned

  • Hear about real-world experiences from multiple breaches spanning different cloud service providers
  • Creating, managing, and patching Virtual Machines differently
  • Identify common pitfalls that can be avoided
  • Overcome vulnerability management
  • Simplify and centralize visibility, blocking, and remediation

16:30 EDT

Closing Remarks from the Chair