Start your day off with a VIP Breakfast:
Considering the rise of remote work, and employees trying to maximize their productivity, it is not surprising that the number of apps that are not managed or owned by IT has grown to 60%1. Shadow IT creates one of the biggest challenges we face in a security community. Bad actors use sophisticated methods to exploit personal devices and cloud apps to gain access to enterprise resources. How can you empower your employees to be productive and still maintain visibility and protection? Join us for this session to learn more about the risks of Shadow IT, how to evaluate in your environment and areas to help manage control while still balancing employee productivity.
Take a refreshing break with warm treats:
Join us to learn how to bridge gaps between NetSec and CloudSec and accelerate application delivery. Multiple firewall and cloud vendors across a hybrid infrastructure make it nearly impossible for network security teams to maintain visibility and control.
We’ll show you how to centralize and automate network access, eliminating manual tasks and optimizing SLAs, compliance, and security. This session will cover:
- Centralizing segmentation management
- Automating and orchestrating network access
- Integrating security policy checks into the CI/CD pipeline
- Improving collaboration between network and application teams
Re-energize with a warm lunch:
Take a refreshing break with warm treats:
A quick refresh to stretch your legs.
Start your day off with a VIP Breakfast:
Is cloud security meeting the expectations of Canadian organizations? Join Kim Schreder, Director of Cybersecurity, Professional Services at TELUS, as she shares insights from the upcoming TELUS Canadian Cloud Security Study that answer this question. Based on the feedback of over 500 Canadian organizations, the study explores the current state of cloud adoption and security in Canada, discusses the challenges organizations are facing with security in the cloud, and examines how organizations are detecting and responding to cloud security incidents.
Take a refreshing break with warm treats:
The cyber threat landscape is complex and continuously changing – risk reporting based solely on cybersecurity controls compliance is no longer enough. Organizations that embark on a cyber risk management journey should start by understanding their level of maturity and establishing their key building blocks – including identifying and setting up the inter-relationships between risks, threat scenarios, key controls and metrics. This workshop will delve into the importance of risk reporting and key metrics the cybersecurity team should focus on to get attention and investment from senior leadership.
Re-energize with a warm lunch:
Take a refreshing break with warm treats:
A quick refresh to stretch your legs.
Start your day off with a VIP Breakfast:
It is possible to design, pursue, and attain your dream job. Join this session to learn about Pam Lindemoen's journey to her current role as a CISO Advisor at Cisco. She will discuss how to successfully navigate through some of the challenges and obstacles unique to women in the cybersecurity industry to reach your own full potential.
Take a refreshing break with warm treats:
Cybersecurity teams often find vulnerabilities, which can be a significant challenge, especially when they are zero-day vulnerabilities. There is a growing marketplace where vulnerabilities are traded, while at the same time companies feel a growing pressure to pay bug bounties. This presentation will explore the evolving threat and examine whether companies are potentially creating their own vulnerabilities when decommissioning hardware. We tested the hypothesis that decommissioning processes may not always wipe a device clean, leaving critical data from the previous owner accessible and open to abuse. Join us to hear what we accessed and the potential damage it could cause.
Re-energize with a warm lunch:
From recruitment to advancement and retention, join us for lessons from the field on breaking down the barriers for women’s empowerment in cyber security and improving business performance.
Take a refreshing break with warm treats:
A quick refresh to stretch your legs.
Cybersecurity transformation has become imperative for organizations to simplify and elevate their security today and ensure that they’re ready for what’s next.
Start your day off with a VIP Breakfast:
Take a refreshing break with warm treats:
The key to your success is understanding your superpower and how you can hone it in your cyber career. Participate in our discussion with our panelists from diverse backgrounds working in cyber at CAE and learn from their journey. Our discussion will follow diversity and inclusion as key drivers of success in the ever-evolving cybersecurity arena.
Unlocking the power of diversity and inclusion in the cybersecurity landscape leads to exceptional competitive advantages. By advocating for an environment that values different perspectives, experiences, and backgrounds, organizations can empower themselves to tackle complex challenges with a broader range of innovative solutions.
Re-energize with a warm lunch:
Take a refreshing break with warm treats:
A quick refresh to stretch your legs.
Emerging Leaders in Canadian Security (ELCS) and siberX have partnered to create Emerging Leaders CanHack (ELCH), a hackathon aimed at bringing fresh minds and emerging leaders in front of established leaders to shape the future. ELCH is designed to provide partner businesses an opportunity to witness young practitioners solve real-world problems related to cybersecurity and international relations. An advisory board consisting of academic and industry leaders will guide and advise participants. The hackathon consists of two prompts, and participants can form teams of up to four members. The competition will take place virtually, and participants will receive access to cybersecurity tools and free training to develop their response to the prompt. Join us as we crown the winners!!!!
By focusing on the triage of confidentiality, integrity and availability, security professionals are not only protecting the misuse of data but are constantly playing a critical role in identifying fraudulent activity and data. With a combination of IAM tools, enhanced telemetry and logging, security professionals are at the forefront of combatting in fraud in multiple critical sectors. Join us to learn more about this increasingly complex and important field.
First Course:
Kimberley Black is a public speaker and an advocate of her #bpositive and Take Your Power Back messages initiated to help others build resilience and promote an end to gender-based violence. Motivated by the overwhelming support received following trauma, she and her husband were inspired to create the Take Your Power Back show to promote the beauty of humanity in times of crisis through the art of dance, storytelling, and music.
Her message relates strongly to resiliency after an attack and has crucial lessons for security professionals. Join Kimberley in conversation with our advisor Ali Abbas Hirji in a fireside chat at our Gala Night "Resiliency After an Attack: A Fireside Chat"
Second Course:
In their keynote Fatima and Amna will share their story of building a 500,000-dollar company and realizing the under-representation of girls and females in the startup, unicorn and tech world. They are now on a mission to fix the gender and digital divide and empower every girl to live her best life.
Dessert:
Presentation of the Canadian Women in Cybersecurity awards, honouring outstanding individuals in three categories: Lifetime Achievement, Woman in Leadership, and Ally Awards. Be part of this inspiring event as we recognize and celebrate the remarkable contributions and achievements of women in the cybersecurity field.
Build Your Squad Corner
- Come network with other attendees who are on the same journey as you
- Engage with experts who are there to answer all your questions in the Ask Me Anything rounds!
WiCYS Career Village
- Get your LinkedIn and Resume reviewed and get advice on how you can make impactful changes
- Engage in Career Conversations with mentors who can guide you on your journey as you navigate your career whether you are entering the field or are a ventran
Headshot Zone
- Get a professional headshot taken that you can use on LinkedIn or anywhere else!
Booths
- Engage with colleges, universities, cybersecurity cert bodies and of course, employers who are onsite to talk about the openings in their organizations
Want to test your ability to respond to a real-time breach or security situation? Drop by our Cybergamified section and sign up for a live game.
Want to test your ability to respond to a real-time breach or security situation? Drop by our Cybergamified section and sign up for a live game.
The Canadian Women in Cybersecurity conference celebrates the diversity of thought, experience, ability, and background. The genuine challenge of diversity in the Canadian cybersecurity ecosystem is not limited to hiring practices alone – bringing diversity into our thinking about cybersecurity challenges propels innovations and techniques that will position Canada as a global leader in cybersecurity. With more diversity to solve cybersecurity challenges, we bring creativity and representation to the table, and our conference demonstrates precisely how.
Going into its fourth year, this event will highlight the achievements and innovations of various cybersecurity leaders in Canada who come from diverse educational, technical, social, and personal backgrounds.
From celebrating novel products and tools to learning from leaders who have shattered the glass ceiling and paved the way for diversity, this conference is geared toward a diverse audience. As a result, your organization can position its brand, services, and philosophy and establish trust and new relationships with eminent personalities in the cybersecurity community.
With inspiring keynotes and panels, hands-on technical reviews, gamified in-person and virtual engagements, career conversations, and an awards gala, another riveting experience awaits.
Yes you can! We have a virtual pass which covers all the LearnX and Gala night sessions.
Yes! Come network and connect with exhibitors at the conference. Visit our CareerXpo area to meet with organizations looking to hire new talent with lots of career-building opportunities.Â
Simply purchase your ticket on siberx.org, and once you arrive at the event, have your photo ID ready to show the check-in desk.Â
We accept all major credit cards.
Yes we do! Valid identification will be required at check-in.
Our event is dedicated to providing a harassment-free conference experience for everyone, regardless of gender, gender identity and expression, age, sexual orientation, disability, physical appearance, body size, race, ethnicity, religion (or lack thereof), or technology choices. We do not tolerate harassment of conference participants in any form. Sexual language and imagery is not appropriate for any event venue, including talks, workshops, parties, Twitter and other online media. Event participants violating these rules may be sanctioned or expelled from the event (without a refund) at the discretion of the conference organizers.
You can purchase tickets by clicking the Tickets tab.
Tickets are non-cancellable, non-refundable. We may be able to reassign your ticket- send an email to [email protected]
To upgrade, please send an email to [email protected]
Based on availability, we may be able to accommodate this request.
Tickets are limited, there may be same-day tickets again, but we cannot guarantee.
CareerXpo ticket holders will only have access to the Career Zone. To view the sessions, please purchase a LearnX, GalaX or Full Conference Pass.
Yes, you will have access to the CareerXpo.
600 Hwy 7, Richmond Hill, ON L4B 1B2
There is ample free parking at the hotel, as well as free underground parking.
Please use the following link for discounted group rates.
https://www.marriott.com/event-reservations/reservation-link.mi?id=1679670014171&key=GRP&app=resvlink
Yes!
Service and support animals are welcomed.
Breakfast, lunch and snack breaks will be provided to all full conference pass and LearnX ticket holders. GalaX attendees will also receive a served dinner. Please add your dietary restrictions with details during registration and we will accommodate accordingly.
Please apply at siberx.org/volunteer
Please send an email to [email protected]
If you have any more questions, please use the chat option or send us an email at [email protected]
Start your day off with a VIP Breakfast:
Considering the rise of remote work, and employees trying to maximize their productivity, it is not surprising that the number of apps that are not managed or owned by IT has grown to 60%1. Shadow IT creates one of the biggest challenges we face in a security community. Bad actors use sophisticated methods to exploit personal devices and cloud apps to gain access to enterprise resources. How can you empower your employees to be productive and still maintain visibility and protection? Join us for this session to learn more about the risks of Shadow IT, how to evaluate in your environment and areas to help manage control while still balancing employee productivity.
Take a refreshing break with warm treats:
Join us to learn how to bridge gaps between NetSec and CloudSec and accelerate application delivery. Multiple firewall and cloud vendors across a hybrid infrastructure make it nearly impossible for network security teams to maintain visibility and control.
We’ll show you how to centralize and automate network access, eliminating manual tasks and optimizing SLAs, compliance, and security. This session will cover:
- Centralizing segmentation management
- Automating and orchestrating network access
- Integrating security policy checks into the CI/CD pipeline
- Improving collaboration between network and application teams
Re-energize with a warm lunch: