Upcoming Events
  • veeam

    Enjoy our seamless checkin process and grab your information for the day. We have a fresh selection of breakfast selections available to you right after.

  • SANS GIAC

    Recharge with a tasty snack break!

    Almond Butter Protein Bar
    Ontario Apple Oat Bar
    Indulgent Energy Bar
    Dark Chocolate, Raspberry & Crispy Rice
    Acai Bowl
    Mixed Berry Smoothie, Vanilla Yogurt, Mango
    Hemp Seeds & Chia | NF, GF, V
    Fruit Skewers
    Mango Passion Fruit Cold Pressed Juice
    Freshly brewed regular & decaffeinated Coffee & Teas.

  • SailPoint

    The rapid adoption of AI agents creates new security risks. Operating as unmanaged "shadow workers," these digital teammates can bypass traditional controls by accumulating excessive permissions. A unified identity strategy is critical.

    This session explores how to govern human and AI agent identities together using SailPoint. We will cover how to discover and onboard all agents, assign human owners for accountability, and apply consistent governance. This approach allows you to safely embrace AI-driven automation by securing every identity in your enterprise—whether human or machine.

  • veeam

    Despite a wide adoption of security awareness programs, 68% of employees still knowingly engage in risky behavior. This session moves beyond compliance checkbox exercises to explore how behavioral science is transforming security culture. We'll examine why traditional click-through training fails, how attackers exploit predictable psychological vulnerabilities, and what interventions actually change behavior.

    Key takeaways include how to apply behavioral science principles to security programs, metrics that predict risk reduction, and how to frame cultural investments for board-level conversations.

  • Varonis

    This presentation explores the challenges and solutions for data protection in the era of Generative AI, focusing on Microsoft 365 Copilot and the partnership between Varonis Systems and Microsoft. It highlights real-world risks, best practices, and automated approaches to securing sensitive enterprise data as organizations adopt AI copilots and agents.

  • This roundtable examines D&O insurance, individual indemnification, and contractual safeguards, highlighting common gaps and key questions CISOs should raise with Boards, legal teams, and insurers to protect themselves in today’s risk environment.

  • Stretch your legs and take a deep breath!

  • trend micro

    Simple guardrails that let organizations innovate with AI without losing control of risk.

  • Cloudflare

    Based on the 2026 Cloudflare App Innovation Report, which surveyed over 2,350 global leaders (including Canadian executives), this session explores the widening gap between "Leaders" and "Laggards." We will dissect why 13% of organizations are outpacing their peers by aligning security with innovation, rather than treating it as a silo.
    Attendees will discover:
    The AI Catalyst: Why modernized infrastructure is the only path to "Builder" status in the AI race.
    The Velocity Trap: Data proving that strict security alignment actually accelerates speed-to-market and reduces remediation time.
    A Framework for CISOs: Four actionable steps to streamline decision-making, automate security, and empower developers to build for what’s next.

  • CheckPoint

    As space and IoT become part of critical infrastructure, the security perimeter extends beyond the firewall. This session highlights the geopolitical and cyber risks shaping this new landscape

  • This roundtable explores how senior security leaders can manage these parallel communications, maintain trust, and align leadership decision-making under pressure.

  • OpenText

    Refuel and re-energize with a warm lunch

    Caesar Salad
    Coast to Coast Seafood Corn Chowder, PEI Potatoes, Mussels,
    Pan Seared Salmon
    Roasted Chicken
    Montreal Spiced Rub Brisket
    Warm Red Skin Potato Salad
    Seasonal Roasted Vegetable Medley
    Chocolate Mousse
    Warm Ontario Apple Crumble Tart
    Citrus Puff Tart

  • palo alto networks

    The narrative of the AI era has been dominated by fear. We believe it's time to change that.
    6 Predictions for the AI Economy: 2026’s New Rules of Cybersecurity is the ultimate guide to the new rules of cybersecurity. We break down the latest technologies and threats you need to understand now:The new workspace threat, Securing the AI agent and the quantum countdown. These predictions provide the blueprint for an autonomous, platform-centric defense.

  • CheckPoint

    A brief look at emerging identity threats created by synthetic media and fake personas.

  • SANS GIAC

    Recharge with a tasty snack break!

    Vanilla & Chocolate Marbled Mini Cake
    Lemon Mini Cake
    Spicy Honey Mini Cake
    Classic Opera Chocolate And Coffee Cake
    Fruit Skewers
    Raspberry Lemonade With Mint
    Freshly brewed regular & decaffeinated Coffee & Teas.

  • Black Duck

    The rush to embed AI into AppSec pipelines is outpacing enterprises’ ability to govern it. What happens when regulators and auditors start asking hard questions?

  • Arctic Wolf

    As cyber risk becomes business risk, CISOs must shift from tool management to outcome-driven security. This session focuses on building resilience through visibility, response readiness, and the right balance of internal and external capabilities.

  • As geopolitical tensions move from the battlefield to the server room, the traditional background check has become an obsolete defense against sophisticated insider threats. This session explores how to transform hiring into a proactive security pillar, ensuring that the people granted access to your network are your greatest assets rather than your most dangerous vulnerabilities.

  • Stretch your legs and take a deep breath!

  • OpenText

    Unlock full visibility into your data estate with AI-driven data discovery and classification. Identify where sensitive data resides, apply the right protections, reduce risk exposure, and lower storage costs while enabling trusted, sovereign AI.

  • sentinelone

    Ransomware once defined the modern threat landscape—until attackers found a more scalable, stealthy, and psychologically potent weapon: Generative AI. As organizations rapidly embed Gen AI into business processes adversaries are learning how to hijack these systems to manipulate outcomes, exfiltrate sensitive data, and erode trust at machine speed.
    This presentation explores how Gen AI hijacking is emerging as the next evolutionary step in cybercrime. We will examine real-world attack patterns including prompt injection, model poisoning, data leakage via inference, and AI-driven social engineering—demonstrating how these techniques can cause operational paralysis and financial impact comparable to, or greater than, traditional ransomware campaigns.
    Attendees will gain a clear understanding of why Gen AI systems are becoming high-value targets, how these attacks differ from classic malware, and what security leaders must do now to detect, contain, and prevent AI-centric threats. The session concludes with practical guidance on securing AI pipelines, monitoring model behavior, and building resilience before Gen AI hijacking becomes as ubiquitous—and devastating—as ransomware once was.

  • Seasoned CISOs are increasingly asking a pivotal question: what comes next after having the top security job? This interactive roundtable explores how security leaders can prepare, and translate hard-earned operational experience into meaningful, high-impact “second chapters” across industry, government, startups, academia, and community leadership without losing relevance or purpose.

    Participants will examine the career paths CISOs are pursuing today: board and advisory roles, venture and private equity operating partnerships, public-sector and critical infrastructure leadership, founder journeys, interim executive models, consulting platforms, and portfolio careers that blend several of the above. We will discuss what makes the CISO skillset uniquely valuable beyond a single full-time role enterprise risk fluency, crisis leadership, trust-building, and the ability to align technology, business outcomes, and human behaviour under pressure.

    Attendees will leave with a clear set of actions to begin planning and preparing early so the next step is deliberate, resilient, societally impactful, stimulating, satisfying and fun.

  • Qualys

    Join us in celebrating exceptional cybersecurity leaders whose vision, leadership, and contributions continue to shape the industry.
    ⦁ Emerging Cybersecurity Leader Award
    ⦁ Community Champion Award
    ⦁ Visionary Award
    ⦁ CISO of the Year Award
    ⦁ Lifetime Achievement Award