siberXchange 3.0

siberXchange is a global community of cybersecurity leaders and professionals representing leading organizations across the world. Led by an advisory of cybersecurity champions, this online community has groups for problem solving, custom solutioning, networking and broadcasting.

Address the global community from our reporting hub with live statistics and immersive visuals: multilingual, accessible and customized outreach.

Together, we secure our world and communicate through live streams, whitepapers and demonstrations.

Together, we build the future of cybersecurity professionals and welcome learners to join us in collaborative educational exchanges and employment outreach.

This is Your Global Cyber Community.

Chief Cybersecurity Advisor
Chief Cybersecurity Advisor at Microsoft
Director, Emerging Technologies, AI & Cyber
Director, Emerging Technologies, AI & Cyber at Durham College
Director, Privacy, Risk and Information Security Management
Director, Privacy, Risk and Information Security Management at Ontario Health
Senior Managing Consultant
Senior Managing Consultant at IBM Security
Co-Founder
Co-Founder at Arc Compute Ltd.
Manager, Application Services
Manager, Application Services at City of Richmond Hill
CEO
CEO at GroundLevel Insights
Senior Cyber Risk Consultant
Senior Cyber Risk Consultant at CDW Canada
Cyber Defense Trainer
Cyber Defense Trainer at Secure Communications and Control Experts
Head of Security Governance and Compliance
Head of Security Governance and Compliance at CDW Canada
Professor and Researcher
Professor and Researcher at Durham College
Co-Founder and Lead Instructor
Co-Founder and Lead Instructor at Cyber Insurance Education Inc.
vCISO
vCISO
President and Founder
President and Founder at Netmechanics
Sr. Product Security Architect
Sr. Product Security Architect at SAP
Director of Information Security
Director of Information Security at Thompson Rivers University
VP of IT
VP of IT at DUCA Financial
CIO
CIO at Region of Durham
Principal
Principal at Cyber Sage Security
CIO
CIO at Electrical Safety Authority
CEO & Co-Founder
CEO & Co-Founder at BlokSec Technologies
Senior Information Security Analyst
Senior Information Security Analyst at TD
Chief Information Officer
Chief Information Officer at Laurentian University
Vice President Information Technology
Vice President Information Technology at Enova Power Corp
Director, Cyber Strategy
Director, Cyber Strategy at Deloitte
Director of Enterprise Risk Management
Director of Enterprise Risk Management at UBC
Principal
Principal at Ritesh Kotak Consulting
Founder
Founder at WiCSP
Cyber Security Consultant
Cyber Security Consultant at Honeywell
Cybersecurity Security Specialist
Cybersecurity Security Specialist at United Farmers of Alberta Cooperative Limited
Director of Solution Architecture
Director of Solution Architecture at Perimeter 81
CEO
CEO at Talisman Security Inc
Director of Cyber Security Operations
Director of Cyber Security Operations at Scotiabank
CEO
CEO at Minute School
  • Known Unknowns: How do you Scan For Unknown Vulnerabilities in a Fast Paced, Global financial market.

  • Following a series of complaints from customers about unauthorized transactions, a financial institution has established a pattern consistent with a cyber attack. It has become evident that the transactional systems within the bank are compromised and that multiple actors, spread across international borders, are potentially involved. Initial investigations are revealing a spear phishing campaign may have utilized a vulnerability in an operating system that has now released key controls to illegitimate actors.We invite your team to prepare this institution in the midst of this shift? What are some of the best practices they should adhere to and how do they consolidate threat intelligence feeds. Your approach should outline how your team will work collaboratively with the institution to address the shifting landscape and provide actionable intelligence.

  • As a result of the pandemic, a financial institution has been forced to move operations to distributed and remote frameworks. Aware of the growing cyber risks facing digital banking, executive teams are concerned that remove workers are beyond the scope of their montoring and proactive thread capabilities. Employees have already reported COVID related pishing emails and their threat surface increases.

  • A local government centrally manages and operates hydro and water operations for its constituents. In light of the recent attacks in North America, the IT team would like to proactively detect and respond to suspicious activity. However, given the detrimental costs of false positives, the team is unsure of how AI-driven models can action threat intelligence accurately. How can you help with the adoption of a new tool?

  • There is growing concern that critical infrastructure, such as energy and utilities, may be a target for disruption and/or espionage. In addition to establishing a plan to detect and manage insider threats, a series of activities need to be considered to ensure organizational preparedness and response. What steps should organizations/institutions take to build cyber resilience?

  • Many of the recent cyber attacks have utilized legitimate resources such as common applications or existing file objects as their initial entry point when targeting organizations with evolved tactics and techniques. Education is specifically susceptible to this type of entry point since both students and faculty bring devices from the outside and connect to the school network. It is also very common to use a significant number of unregulated applications. Document sharing and documents existing in both the private and public environment is also a challenge for educational entities. In several incidents a student has downloaded a vulnerable application to their personal device and become compromised, to worsen the matter they have connected their compromised device to the school network and transferred files to their teacher. To make matters exponentially worse in at least one of the cases the teacher then published the infected documents on a public drive for other students to access causing lateral movement. How can we prevent this from happening again?

Event Details
Sponsors