siberXchange 3.0

siberXchange is a global community of cybersecurity leaders and professionals representing leading organizations across the world. Led by an advisory of cybersecurity champions, this online community has groups for problem solving, custom solutioning, networking and broadcasting.

Address the global community from our reporting hub with live statistics and immersive visuals: multilingual, accessible and customized outreach.

Together, we secure our world and communicate through live streams, whitepapers and demonstrations.

Together, we build the future of cybersecurity professionals and welcome learners to join us in collaborative educational exchanges and employment outreach.

This is Your Global Cyber Community.

Chief Cybersecurity Advisor
Chief Cybersecurity Advisor at Microsoft
CISO
CISO at Youth Employment Services
Director, Information Security & Risk
Director, Information Security & Risk at City of Toronto Toronto Community Housing
Senior Managing Consultant
Senior Managing Consultant at IBM Security
Co-Founder
Co-Founder at Arc Compute Ltd.
Manager, Application Services
Manager, Application Services at City of Richmond Hill
CEO
CEO at GroundLevel Insights
Senior Cyber Risk Consultant
Senior Cyber Risk Consultant at CDW Canada
Cyber Defense Trainer
Cyber Defense Trainer at Secure Communications and Control Experts
CSO
CSO at CDW Canada
Professor and Researcher
Professor and Researcher at Durham College
Co-Founder and Lead Instructor
Co-Founder and Lead Instructor at Cyber Insurance Education Inc.
vCISO
vCISO
President and Founder
President and Founder at Netmechanics
Sr. Product Security Architect
Sr. Product Security Architect at SAP
Director of Information Security
Director of Information Security at Thompson Rivers University
VP, IT Operations, Infrastructure & Cybersecurity
VP, IT Operations, Infrastructure & Cybersecurity at DUCA Financial
CIO
CIO at Electrical Safety Authority
Professional Services Security Lead
Professional Services Security Lead at AWS Canada
Strategic Advisor and Corporate Board Director
Strategic Advisor and Corporate Board Director at Descartes Systems Group
CEO & Co-Founder
CEO & Co-Founder at BlokSec Technologies
Senior Information Security Analyst
Senior Information Security Analyst at TD
Chief Information Officer
Chief Information Officer at Laurentian University
Vice President Information Technology
Vice President Information Technology at Enova Power Corp
Director Cybersecurity & GRC
Director Cybersecurity & GRC at Allstate
Director of Enterprise Risk Management
Director of Enterprise Risk Management at UBC
Principal
Principal at Ritesh Kotak Consulting
Founder
Founder at WiCSP
Cyber Security Consultant
Cyber Security Consultant at Honeywell
Business Information Security Officer
Business Information Security Officer at TD
Director of Solution Architecture
Director of Solution Architecture at Perimeter 81
CEO
CEO at Talisman Security Inc
Director of Cyber Security Operations
Director of Cyber Security Operations at Scotiabank
  • Known Unknowns: How do you Scan For Unknown Vulnerabilities in a Fast Paced, Global financial market.

  • Following a series of complaints from customers about unauthorized transactions, a financial institution has established a pattern consistent with a cyber attack. It has become evident that the transactional systems within the bank are compromised and that multiple actors, spread across international borders, are potentially involved. Initial investigations are revealing a spear phishing campaign may have utilized a vulnerability in an operating system that has now released key controls to illegitimate actors.We invite your team to prepare this institution in the midst of this shift? What are some of the best practices they should adhere to and how do they consolidate threat intelligence feeds. Your approach should outline how your team will work collaboratively with the institution to address the shifting landscape and provide actionable intelligence.

  • A bank is preparing for the launch of a series of digital wallets and would like to conduct a complete vulnerability analysis. More importantly, the analysis must distinguish between client and server side vulnerabilities and make recommendations. In light of a changing economy, the analysis must be forward thinking and ready to take on new trends.

  • As a result of the pandemic, a financial institution has been forced to move operations to distributed and remote frameworks. Aware of the growing cyber risks facing digital banking, executive teams are concerned that remove workers are beyond the scope of their montoring and proactive thread capabilities. Employees have already reported COVID related pishing emails and their threat surface increases.

  • There is growing concern that critical infrastructure, such as energy and utilities, may be a target for disruption and/or espionage. In addition to establishing a plan to detect and manage insider threats, a series of activities need to be considered to ensure organizational preparedness and response. What steps should organizations/institutions take to build cyber resilience?

  • Many of the recent cyber attacks have utilized legitimate resources such as common applications or existing file objects as their initial entry point when targeting organizations with evolved tactics and techniques. Education is specifically susceptible to this type of entry point since both students and faculty bring devices from the outside and connect to the school network. It is also very common to use a significant number of unregulated applications. Document sharing and documents existing in both the private and public environment is also a challenge for educational entities. In several incidents a student has downloaded a vulnerable application to their personal device and become compromised, to worsen the matter they have connected their compromised device to the school network and transferred files to their teacher. To make matters exponentially worse in at least one of the cases the teacher then published the infected documents on a public drive for other students to access causing lateral movement. How can we prevent this from happening again?

Event Details
Sponsors