Agenda

Day One : Friday, November 20, 2020

10:00 EST

10 min

Welcome and Opening Remarks from the Chair

11:10 EST

60 min
Ferris Adi

Optimizing the future, The 5G & IOT Revolution: Here's What To Expect

Ferris Adi, Senior Security & Compliance Manager, Rogers Communications

  • 5G is a next-generation mobile network technology that can enable an astonishing range of innovative new products and services and offers the promise of significant economic and social benefits as well. However, like many emerging technologies, it is equally likely to disrupt multiple industries
  • The arrival of 5G and the growth of IoT devices are guaranteed to affect the cybersecurity landscape, it is so imperative that companies proactively assess their security strategies and data security
  • 5G also introduces critical concerns around data security and  privacy that Cyber Security and Privacy  professionals need to understand, mitigate and manage.
  • This session will establish a clear understanding of the essentials around 5G & IOT  from a privacy and security perspective
  • This  session will discuss why deploying a risk-based approach to security will be critical, ensuring that high-risk areas are seen as the biggest priority, in order to minimize damage

12:10 EST

60 min

Break

13:10 EST

60 min
Mahmoud Mussa

Importance of Cybersecurity in Telecommute

Mahmoud Mussa, Senior Cybersecurity Analyst, Indigo

  • Benefits of Covid-19 in adapting Telecommuting workforce in many companies including ‘fortune 500’
  • What are the acceleration drivers behind this shift in Technology & lifestyle?
  • Cybersecurity policies are the principal difference between being on premise and remote
  • How to develop a state of art and secure Telecommuting Strategy
  • Scale through secure and trusted solutions. Is the cloud a safe place?

14:10 EST

20 min

Break

14:30 EST

60 min
Nareg Froundjian

Responding to a Business Email Compromise Under PIPEDA

Nareg Froundjian, Associate Attorney, Data Privacy & Cybersecurity Law, Deloitte

  • What is a business email compromise and why / how does it still happen?
  • Identifying the applicable laws and regulations, establishing a legal privilege strategy, and high level audit
  • Assessing the scope of the breach and determining reporting (to privacy commissioners) and notification requirements (to affected individuals)
  • Remediating the breach and “lessons learned” exercise, including common quick wins and some less common WFH considerations
  • Best offense is defense – how to prepare for any type of breach with comprehensive cyber, legal and communications services

15:30 EST

60 min

Redefining the Security Perimeter: Why Protecting Identities is More Important Than Network Security

  • Digital transformation, the cloud and working remotely have made the traditional perimeter-based network defense obsolete. In these unprecedented times, forcing remote users through internal Network infrastructure creates performance bottlenecks and often does more harm than good.
  • Strong Information Security teams operate with an “assume breach” mentality making a VPN connection no longer enough to assure secure access of apps and data. Enter the Zero-Trust security model.
  • With the proliferation of SaaS applications, mobile devices and cloud services, the security perimeter has been redefined. “Never Trust, Always Verify” is the new mantra in which just enough access is granted to strongly authenticated identities on secure, compliant devices in verified locations. These modern security concepts are what makes Identity and Access Management so important, and why identity must be recognized as a modern security perimeter.
  • Attendees will learn about the prevalence of identity based attacks, the history and current state of Zero Trust and how they can protect their users by applying modern security principles around their identities and data. Topics covered in this session are especially important as more organizations have shifted to a work from home model due to the recent Covid-19 pandemic

16:30 EST

Closing Remarks from the Chair