Canadian Women in Cybersecurity

05 MAIN EVENT  76A1411

Bringing diversity in the cybersecurity workforce by educating and inspiring women from all walks of life and all generations. Come and learn from the leaders who broke the glass and paved the way for the rest of us to be able to lead and excel in cybersecurity. From career development to inspiring keynotes, from IoT to best practices in cybersecurity and even hacking demos. We look forward to seeing you there!


Admission Ticket

Student Ticket

Student Ticket

The sun over Lake Ontario will greet you to the Harbour Sunrise breakfast arrangement the team at siberX and Westin have created to ensure you have the best start to the best day. Make sure you arrive on time!

Master of Ceremonies - Victoria Pelletier

National Anthem: Dignitary Speeches (TBA)

Hon. Jill Dunlop - Member of Provincial Parliament for Simcoe North, and the Minister of Children and Women’s Issues.

David Piccini - Member of Provincial Parliament for Northumberland-Peterborough South. He currently serves as the Parliamentary Assistant to the Minister of Colleges and Universities and is a member of the Standing Committee on Finance and Economic Affairs.

Galit Baram - Consul General of Israel in Toronto and Western Canada

Samantha Madrid

This session will explore Samantha’s journey to find success as a business leader, navigating obstacles, objections, and rejections. She’ll use personal anecdotes to explain how she developed new skills and creative muscles to find a path to yes, focusing on achieving her goals despite hearing no.

Dr. Gina Cody

We have evidence to show that unconscious and conscious bias have serious issues in tech development. I think to talk about the importance of diversity in cybersecurity as a check against unconscious bias to make sure there are proportional representatives involved in developing these technologies would be important. Cybersecurity involves defensive and offensive measures.

From a defensive perspective, studies show that diverse teams are more creative. Not to mention that hackers and online criminals represent a diverse group of people and therefore can be better understood using a diverse perspective.

From an offensive perspective, it’s important to make sure that technology isn’t embedded with racial, cultural, religious or gender biases.

Sponsored by MobilIron

Spark curiosity and creativity with these right brain–boosting foods.
Selected to inspire ideation and spark ”out-of the-box” thinking.

10:10 - 10:40: Social Engineering; Through the eyes of Psychology - by Victoria Granova (Queens Quay Room 1)
10:10 - 10:40: Juniper Breakout - Riadh Trabelsi (Queens Quay Room 2)
10:10 - 10:40: Hacking Demo; Helen Oakley, Ophelier Chan, Vitaly Volovich (Queens Quay Room 3)

Dr. Eman Hammad

Accelerated digital innovation is penetrating every facet of modern society driving transformation across all industries and services. Innovations in wireless communication technologies and power electronics paved the way for the hyper-connectivity era, where the Internet of Things (IoT) is one of the defining characteristics of the new industrial revolution. By 2030, it is expected that there will be 50 billion connected (IoT) devices in the world: bridging our personal lives at home/home, enabling digital care services, providing the building blocks of smart cities and smart factories. Most importantly, IoT devices are/will be collecting massive amounts of data to enable intelligent decision making (Ml/AI) and automation promising solutions to major challenges from personalized medicine to sustainable agriculture. The reality of how IoT is, and will increasingly be, an integral part of our connected world only emphasizes the critical impact that cyber threat actors can impose on what and who is connected. The current state of IoT cybersecurity and privacy is alarming particularly due to 1) lack of cybersecurity regulations and standards, and 2) current IoT manufacturing practices where cost and time to market are prioritized over maturity. Recent IoT cyber incidents exemplify the ease of exploiting the IoT eco-system and scale of impact/disruption. This will be further complicated with the advent of the next generation wireless mobiles networks (5G) which would provide connectivity for massive IoT devices with abundant bandwidth and access that could be exploited to amplify potential malicious cyber-attacks and threaten the enabling 5G itself.

In this talk, we will discuss recent developments and industrial best practices to improve the current state of IoT cybersecurity & privacy, including digital trust platforms and frameworks. We will also highlight remaining challenges and gaps and what cyber-risk management strategies organisations can follow for a safer and more reliable IoT adoption and integration.

Dreaming of sun-soaked Tuscan villa's and warm Italian comfort food in this dreary weather? siberX along with the Westin staff have put together a little Taste of Italy for your lunch-time getaway.

Sponsored by Broadconnect

Sponsored by Proofpoint

Keep minds clear and sharp with these focus-enhancing foods, known to improve cognitive function and memory, for maximum concentration.

Diana Kelley, and Lisa Lorenzin

As the world continues to transform into a connected, digitally-empowered ecosystem, with data growing at an exponential rate, we have begun to witness the inherent risks it brings. Forbes estimates that by 2021, there will be $6 trillion in damages stemming from cybersecurity breaches. Join Diana Kelley and Lisa Lorenzin, to understand the benefits and challenges of cybersecurity, and how to keep pace with the rapid transformation.

Winner Announcements - iSecurity Jamaica trip giveaway & Lifetime achievement award

Event Details