Canada’s Most Curated Executive Cybersecurity Platform
This executive cybersecurity conference brings together leaders from AI, cybersecurity, government, and academia for a full-day program focused on AI-driven security risk, emerging cyber threats, and the decisions shaping the future of digital trust. Through a curated mix of executive discussions, applied workshops, live demonstrations, and innovation zones highlighting emerging startups and research, the program provides sponsors with meaningful engagement and direct access to enterprise buyers, policymakers, researchers, and industry leaders in a high-trust, limited-attendance environment.

Built as four distinct, high-impact experiences
This closed-door executive experience brings together leaders from AI, cybersecurity, government, and academia for a full-day program focused on AI-driven security risk, emerging cyber threats, and the decisions shaping the future of digital trust. Through a curated mix of executive discussions, applied workshops, live demonstrations, and innovation zones highlighting emerging startups and research, the program provides sponsors with meaningful engagement and direct access to enterprise buyers, policymakers, researchers, and industry leaders in a high-trust, limited-attendance environment.
|
day 1 |
mAY 25 | 9:00 AM |
This exclusive evening experience brings together cybersecurity professionals, executives, and industry leaders in a high-trust setting designed to foster authentic collaboration and lasting professional relationships. Held alongside a flagship executive forum and featuring a special guest conversation with a globally respected cybersecurity voice, the program creates space for meaningful dialogue, idea exchange, and connection beyond traditional networking. Through curated interactions and limited attendance, sponsors gain direct access to influential leaders shaping the future of cybersecurity in Canada.
|
day 1 |
mAY 25 | 6:00 PM |
The experience brings together Canada’s leading security professionals, executives, employers, and advocates for a full-day program focused on leadership, innovation, and opportunity across the cybersecurity ecosystem. Through a curated mix of technical, executive, non-technical, and non-profit sessions, a dedicated career and hiring experience connecting qualified talent with employers committed to diversity, and an evening gala featuring light leadership conversations and a national awards ceremony, the program provides sponsors with meaningful engagement and direct access to the voices shaping the future of cybersecurity in Canada.
|
day 2 |
mAY 26 | 9:00 AM |
This executive cybersecurity training experience is designed for leaders responsible for navigating AI adoption, risk, and governance in high-trust environments. Anchored by the national Operation Defend the North exercise, the program combines applied instruction, hands-on war room simulations, and real-world scenarios aligned to advanced SANS micro-credentials, enabling participants to move beyond theory and develop practical decision-making frameworks for securing and governing AI at scale. Delivered in a closed, the experience provides sponsors with meaningful engagement and direct access to senior leaders seeking actionable guidance on AI risk, compliance, and operational readiness.
|
day 3 |
mAY 27 | 9:00 AM |
Three days. Curated sessions.
Enjoy our seamless checkin process and grab your information for the day. We have a fresh selection of breakfast selections available to you right after.
Begin your morning with a healthy and inspired breakfast.
Chef's Selection of Seasonal Juice & Smoothies
Cereals | Whole & Skim Milk
Quinoa, Nut & Dried Fruit Granola
Natural & Fruit Flavoured Yogurts
Fruit & Berry Salad
Danish Pastries , Assorted Muffins, Croissants, Mini Bagels,
Sourdough, White & Multigrain Breads
Sweet Butter, Fruit Marmalade , Preserves & Honey
Plain & Fine Herbs & Garlic Cream Cheese
Steel Cut Oatmeal Bar
Brown Sugar, Raisins, Cinnamon , Pecans & Pure Maple Syrup
Classic Scrambled Egg
Cheddar Cheese & Chives | NF, GF, Veg
Join us as we begin with our land acknowledgements and opening comments from dignitaries and special guests.
Explore how AI is revolutionizing cyber threat intelligence, shifting beyond traditional SIEM tools to proactive defense strategies.
Discuss the critical role of AI in preparing for a post-quantum world and its impact on secure migration in the cryptography field.
Recharge with a tasty snack break!
Almond Butter Protein Bar
Ontario Apple Oat Bar
Indulgent Energy Bar
Dark Chocolate, Raspberry & Crispy Rice
Acai Bowl
Mixed Berry Smoothie, Vanilla Yogurt, Mango
Hemp Seeds & Chia | NF, GF, V
Fruit Skewers
Mango Passion Fruit Cold Pressed Juice
Freshly brewed regular & decaffeinated Coffee & Teas.
Delve into how AI is enhancing red teaming by automating attack simulations and defense testing, providing a more efficient and accurate assessment of security systems.
Examine how AI can automate the detection of cyber incidents and improve response times, minimizing human error and reaction delays.
Learn how AI is strengthening cryptographic key management in hybrid cloud environments to ensure data security.
Stretch your legs and take a deep breath!
Understand how AI can enhance blockchain security, focusing on protecting decentralized systems from emerging threats.
Discuss how AI is used in predicting threats and responding to incidents within supply chains to protect businesses from interconnected vulnerabilities.
Explore how AI provides real-time threat intelligence to enhance cloud security, responding to vulnerabilities faster than traditional methods.
Refuel and re-energize with a warm lunch
Caesar Salad
Coast to Coast Seafood Corn Chowder, PEI Potatoes, Mussels,
Pan Seared Salmon
Roasted Chicken
Montreal Spiced Rub Brisket
Warm Red Skin Potato Salad
Seasonal Roasted Vegetable Medley
Chocolate Mousse
Warm Ontario Apple Crumble Tart
Citrus Puff Tart
Explore how AI and human expertise will work together in the future of cyber defense, blending human intuition with AI-driven automation to enhance strategic decision-making.
A thought-provoking panel on the growing use of AI in cybercrime. Experts will discuss how malicious actors are leveraging AI for attacks, the ethical challenges this presents, and what cybersecurity professionals can do to stay ahead.
Learn how AI-driven models will influence the development of global cybersecurity standards, shaping the future of regulations and frameworks to address emerging digital threats
Recharge with a tasty snack break!
Vanilla & Chocolate Marbled Mini Cake
Lemon Mini Cake
Spicy Honey Mini Cake
Classic Opera Chocolate And Coffee Cake
Fruit Skewers
Raspberry Lemonade With Mint
Freshly brewed regular & decaffeinated Coffee & Teas.
Learn how AI automates vulnerability management, identifying and patching weaknesses in systems before they can be exploited.
Discover how AI can simplify compliance with cybersecurity frameworks such as NIST, ISO, and SOC 2, ensuring accurate and timely mapping.
Learn about AI's role in helping organizations navigate and comply with complex privacy regulations such as GDPR and CCPA.
Stretch your legs and take a deep breath!
A high-level executive discussion on how AI is transforming business strategy, cybersecurity, and risk management; focusing on leadership, governance, and competitive advantage at the C-suite level.
Check in, grab your badge, and jump into the buzz—networking kicks off right away!
Step into an electrifying atmosphere as the doors open! Check in at registration, connect with peers, grab a drink, and get ready for an evening filled with energy, insight, and inspiration. This is where cybersecurity minds meet — and the conversations begin.
An open-mic style session featuring raw, unfiltered talks from cybersecurity professionals and community voices. Hear real stories, lessons, and bold perspectives straight from the frontlines. No slides, no scripts — just honest conversations, insights, and a few surprises along the way.
Take a moment to stretch and breathe deep!
Take a moment to stretch and breathe deep!
Shift towards gender diversity in AI governance, analyzing the measurable outcomes of women's influence in leadership positions and policy development.
Recharge with a tasty snack break!
As AI systems increasingly rely on personal data, strong privacy measures are essential to prevent misuse, bias, and surveillance. Embedding privacy-by-design and regulatory safeguards ensures ethical, responsible, and trustworthy AI deployment.
Take a moment to stretch and breathe deep!
Presentation of the Canadian Women in Cybersecurity awards, honouring outstanding individuals in six categories: Lifetime Achievement, Woman in Leadership, Ally in Action, Innovator Award, Emerging Leader, Lift as you Climb, and Mentor Award. Be part of this inspiring event as we recognize and celebrate the remarkable contributions and achievements of women in the cybersecurity field.
Start with an exploration of global cybersecurity and the impact of geopolitical threats. This provides context for understanding the broader risks and their financial, industry, and response metrics.
Take a moment to stretch and breathe deep!
Transition into how businesses can quantify cyber investments and track ROI, which ties into understanding the effectiveness of cybersecurity on a more granular level.
Take a moment to stretch and breathe deep!
Delve into supply chain resilience by measuring the effectiveness of machine identity management and cybersecurity processes in preventing breaches.
Refuel and re-energize with a warm lunch!
Focus on employee compliance with AI usage policies and the operational risks associated with non-compliance, laying the foundation for discussions about AI governance.
Take a moment to stretch and breathe deep!
Follow up with the costs of AI-driven incidents, discussing downtime, legal penalties, and reputation damage, all critical factors when evaluating the broader impact of AI on cybersecurity.
Take a moment to stretch and breathe deep!
Stories of Women leading Cybersecurity innovations Across Continents and building communities globally
Recharge with a tasty snack break!
Move into diversity, equity, and inclusion (DEI), focusing on representation in cybersecurity governance roles and quantifying DEI's impact on business outcomes and organizational resilience.
Take a moment to stretch and breathe deep!
How Women Leaders are Shaping National Cyber Resilience Agendas in Asia, Africa and Middle East by Aligning with Global Cybersecurity Frameworks like NIST, ISO 27001, and National Strategies
Take a moment to stretch and breathe deep!
Protecting APIs & Automation Platforms Examine defensive tactics like bot mitigation techniques, rate limiting protocols & ML-based detection methods to combat
Take a moment to stretch and breathe deep!
Securing IoMT & Healthcare Data Streams Focus on safeguarding connected medical devices, real-time monitoring solutions for anomaly detection & securing telemedicine platforms against targeted cyber threats.
Take a moment to stretch and breathe deep!
Explore the setup and operational best practices for high-fidelity honeypots, deception grids & tactics for active adversary engagement.
Refuel and re-energize with a warm lunch!
This session offers a comparative look at recruitment trends in Canada and emerging markets, highlighting key differences in hiring practices and workforce needs. Gain insights to better navigate global talent acquisition strategies.
Take a moment to stretch and breathe deep!
Analyze how attackers modernize legacy exploits (such as EternalBlue), exploring advanced detection techniques, behavior analytics & endpoint hardening strategies.
Take a moment to stretch and breathe deep!
This session explores how sports organizations can balance fan engagement with data privacy. Learn strategic approaches to integrating privacy into digital experiences, reducing risk, and fostering trust—while staying competitive in a data-driven industry.
Recharge with a tasty snack break!
Cyber Threat Intelligence for beginners – What is CTI and how it reduces your business exposure?
Take a moment to stretch and breathe deep!
The intersecting point between records management and privacy, and how these domains can progress cyber maturity. How privacy assessments can lead to opportunities to implement record keeping processes and how record and data management activities can champion privacy principles.
Take a moment to stretch and breathe deep!
Shift towards a more career-growth-focused topic, helping attendees understand how to find and use mentorship to progress in the field.
Take a moment to stretch and breathe deep!
Provide real-life stories and insights from women who have successfully navigated the cybersecurity career path, followed by practical tips on finding and excelling in roles.
Take a moment to stretch and breathe deep!
Explore how cyber pros tackle fake news, deepfakes, and digital deception. Discover career paths where you can help protect truth in today’s information war.
Refuel and re-energize with a warm lunch!
Start with a broad topic to show the diverse career paths in cybersecurity and appeal to those who might not have a technical background.
Take a moment to stretch and breathe deep!
Cybersecurity is evolving at an unprecedented pace, and women are shaping the future of the industry in powerful ways. In this engaging discussion, Michele Crockett, AVP Product Marketing at Semperis, will share insights from her journey in cybersecurity marketing, exploring the intersection of technology, leadership, and product marketing
Take a moment to stretch and breathe deep!
Raise awareness of and to support a greater appreciation of neurodivergent skills through the lived experiences of other colleagues in privacy and security.
Recharge with a tasty snack break!
This session introduces the fundamentals of email communication and authentication, focusing on SPF, DKIM, and DMARC. Attendees will learn the purpose of each protocol, common implementation challenges in enterprise environments, and relevant email security guidelines impacting organizational practices.
Take a moment to stretch and breathe deep!
This talk provides an overview of traditional and newly emerged career paths in cybersecurity, built with practical advise on how to select the direction and increase success chances on the chosen path.
Take a moment to stretch and breathe deep!
Enjoy our seamless checkin process and grab your information for the day. We have a fresh selection of breakfast selections available to you right after.
Choose Your Access Level
Total Access: AI SECCON (May 25) + Cyber Meetup (May 25)
Canadian Women in Cybersecurity Full Sessions + Gala Dinner & Awards (May 26).
Now//AI Workshop (May 27).
All Meals (Hot Breakfast, Lunch, Snacks) included for all three days.
Restriction: Director-level & Above practitioners only.
Full Access to AiSecCon (May 25).
Access to the Cyber Meetup (May 25).
Hot Breakfast, Lunch, and Snack breaks included.
Restriction: Director-level & Above practitioners only.
Access to the Cyber Meetup (May 25).
Full Access to all Sessions for Canadian Women in Cybersecurity (May 26).
Hot Breakfast, Lunch, and Snack breaks included.
Reserved seating at the Gala Dinner & Awards Ceremony (May 26).
Perfect for celebrating excellence and high-level evening networking.
Access to the Cyber Meetup (May 25).
Full Access to all Sessions for Canadian Women in Cybersecurity (May 26).
Hot Breakfast, Lunch, and Snack breaks included.
Ideal for professionals attending the full-day experience (excludes Gala).
Access to Now//AI Workshop by SANS x siberX (May 27)
Breakfast, Lunch, and Snack Breaks Included
Director-level & Above Security Practitioners Only
Access to the Cyber Meetup (May 25).
Cash Bar Available.
Perfect for those looking to network in a casual setting.
Access to the Cyber Meetup (May 25).
Access to Breakouts & Workshops for Canadian Women in Cybersecurity (May 26).
Full Day of Networking, Mentorship, and Resume/LinkedIn Reviews.
Professional Headshots included.
Note: Valid Student ID required; No meals, main session or gala access.
Partner with Canada’s most curated cyber audience
370 King St W, Toronto, ON M5V 1J9
Stay up to date with everything exciting happening with siberX.
We’re thrilled to have you with us. Expect occasional updates and exclusive offers from siberX. You can unsubscribe anytime.
For details on how we handle your data, see our privacy policy.
