Detailed Program

TIME ACTIVITY Monday October 23 8am-9am Training Registration (Ambrosia Foyer) For participants who have registered for the training portion of the Conference 8am-9am Breakfast (Macintosh) For Monday training participants 9am-10:30am Management Training (Ambrosia III) – Technical Training (Ambrosia IV) – Morning Morning *Training Building the IT Brand to Drive the How Attackers Infiltrate Your Network participants Business Value of IT Do you know the latest tools and must register We all have a brand, both at the personal techniques attackers are using on for the training level, and as an IT organization. Brands networks like yours? How about the portion of the are powerful. Think of Uber, Google, social engineering tactics used against Conference. Coke, Oprah, CNN, Apple – all leading people within your organization? Gain Full Delegate brands that conjure up an image – positive insight from the attacker’s perspective as Passes are or negative. Do you know what your an experienced penetration tester steps valid from personal brand is? What is the brand of through Digital Boundary Group’s proven Monday your team, or the IT organization as a testing methodology, from evening dinner whole? This fun, interactive session will reconnaissance to gaining domain admin onward. step through the core elements of a brand and everything in between. Using real and help you understand the importance examples and scenarios, see how of it in our daily interactions. As you attackers can gain full control of your understand yourself, seek to understand network while learning how to detect others at a different level. IT executives and prevent the attacks every step of the can also transform their organizations. Is way. your IT where you want it to be and how Presented by Digital Boundary Group do you evolve and excel as an IT organization that delivers unquestionable business value to your organization. This workshop will provide some insights and tools to “re-invent” yourself and your team. Presented by Gartner Canada: Debra Christmas, former CIO at City of Kingston as well as the City of Kanata Steve Heck, former CIO of Microsoft Canada 10:30-10:45am Morning Break (Ambrosia Foyer) 10:45am- Management Training – AM Technical Training – AM Continued 12:15pm Continued 12:15-1:15pm Lunch Break (Macintosh) 2:00-7:00pm Trade Show Registration and Set Up (Ambrosia Foyer) 1:15-2:30pm Management Training (Ambrosia III) – Technical Training (Ambrosia IV) – Afternoon Afternoon Evolving Leadership in the Digital Journey Mobile Device Security Digital business is changing how we With the seemingly exponential increase address business expectations, and the in smart devices being used by our teams required to address those workforce at home and at work, it is expectations must be more agile, diverse important to understand the risks. Join and outcome focused. This demands that Digital Boundary Group as we discuss CIOs also become agile in their choice of the current state of security when it situational leadership styles. This comes to Android and IOS smartphones workshop explores why Digital is covering topics such as mobile malware, different, and the leadership styles you privacy, hardware attacks, and the need to master in order to interact with security of related remote access your teams for optimum performance. infrastructure. Combining threat There is not just one leadership style for landscape research and real-life security digital. Different situations will demand situations encountered by DBG’s situational leadership, which is adaptive penetration testers, expect to gain an and dynamic. Situational leadership can understanding of just how risky the world help CIOs learn how to adapt their style to of mobile devices can be. most effectively lead and respond to different digital situations and team needs. In this workshop we will introduce the Five Situational Leadership Types and provide guidance to IT executives on taking this to their management teams. It provides an overview of the five types as well as a self-assessment questionnaire to use with the workshop participants. Presented by Gartner Canada 2:30-2:45pm Afternoon Break (Ambrosia III, IV, Foyer) 2:45-4pm Management Training – Continued Technical Training – PM Continued 6pm-9pm Cocktails, Dinner Reception and Informal Games Night (Ambrosia) *Full Delegate Passes valid from this period to Wednesday Lunch. 9pm-12am Hospitality Suite (Niagara Room) Tuesday October 24 7am-4pm Registration (Ambrosia Foyer) 7am-8:30am Breakfast (Ambrosia) 8:30-9:55am Opening Remarks and Keynote (Ambrosia) - Rafal Rohozinski Managing the Cybersecurity Tsunami: Cybersecurity and Cities in the Emerging Global Digital Economy We live in the century of cities and global digital economy. By 2025, over 60% of global GDP - $64 trillion - will be generated by cities, and over 26% of global GDP will come from the digital economy. Municipalities worldwide are grappling with the challenge and opportunities of rising populations, and, increased needs. They are at the epicentre of change - where the global digital economy converges with public services and governance - facing local leaders with difficult choices, and opportunities. What are the drivers and trends impacting cyber risk for municipal leaders? What can be done to address liabilities and maximize opportunities? Rafal is the Co-founder and principal of the SecDev Group and SecDev Foundation and a senior fellow at the London-based International Institute of Strategic Studies. Prior to founding SecDev, Rafal spent 17 years working in an operational capacity in the former Soviet Union, Asia, Middle East and Africa, and was the recipient of senior fellowships from the Ford foundation, IDRC, and Munk School. He is recognized for his work in information and computer network operations, cybersecurity, security sector assistance and armed violence reduction. During his tenure as the director of the Advanced Network Research Group at the University of Cambridge, he co-founded and served as principal investigator for three projects focused on the nexus between security, stability, and cyberspace: the OpenNet Initiative, the Information Warfare Monitor and the Tele-geography of Conflict Project. Rafal sits on the board of the Canadian Association of Defense and Security Industries, and was previously the Chair of the advisory boards of the Estonian E-Governance Academy and the (Munk School of Global Affairs, ). 8:30-4pm Trade Show (Ambrosia) 10am-10:30am Morning Coffee Break (Ambrosia) 10:30-11:15am Cloud Security and Best Practices for Automated Breach Mitigation and the Public Sector – Scalar Decisions Inc. the Future of Cybersecurity – Palo (Macintosh I) Alto Network (Macintosh II) 11:30-12:15pm Beyond the Network – Protecting Critical Infrastructure – Is it Part of Canadian Municipalities from Your Risk Management Analysis? – Ransomeware, Phishing and Malware AESI (Macintosh II) with a DNS Firewall – CIRA (Macintosh I) 12:30-1:25pm Lunch Break 1:30-2:15pm Improving the Weakest Link in Your Wanna Cry: Lessons Learned from Security Chain – Creating the Human Municipalities and Utilities – Firewall – Calian ITPS (Macintosh I) RootCellar Technologies (Macintosh II) 2:30-3:15pm AI and Machine Based Learning – Our Security Best Practices in the Cloud – Experience – City of Peterborough Amazon Web Services & City of Toronto (Macintosh I) (Macintosh II) 3:30-4pm Trade Show and Afternoon Coffee Break (Ambrosia) 4pm-4:45pm Be Careful What You Ask For: Securing Public Safety LMR & LTE for Challenges and Approaches Smart Cities – Cybersecurity Best Associated with Hardening Cyber Practices from Around the World for Physical Systems – City of Toronto Municipal Public Safety LMR & LTE (Macintosh I) Networks – Motorola Solutions (Macintosh II) 6pm-10pm Cocktails, Dinner and Entertainment (Ambrosia III, IV) 10pm-12am Hospitality Suite (Niagara Room) Wednesday October 25 7:30-8:30am Breakfast 8:30-9:15am Love is in the Air: Building Awareness, Public Sector Adoption of “Born in Creating Interest for End Users, and the Cloud” SaaS Products and Improving Security – MNP LLP Services: Business Case Security – (Macintosh I) Partho Technologies (Macintosh II) 9:30-10am Trade Show and Morning Coffee Break (Ambrosia) 10am-10:45am Zero to Sixty: One Year, a Complete Ransomware - Why You Are NOT Security Overhaul – Town of Huntsville Immune and How to Protect Against (Macintosh I) Ransomware – Xenium IT Corp. (Macintosh II) 11am-12pm Birds of a Feather and Closing Remarks (Ambrosia) Municipalities Share Real Stories of Security Incidents 12pm Closing Remarks and Boxed Lunches (Ambrosia Foyer)