Dec 05
Ways to convince Your Boss Ways to Save Submit Your Talk
X

Submit Your Talk

Overview of the event

Cyber security systems and principles are designed to safeguard websites and web applications from attackers seeking to disrupt, delay, alter or redirect the flow of data. These attackers vary in target, motive, levels of organization, and technical capabilities, requiring public and private organizations to adopt ever-increasing measures to prevent cyber attacks.

Governments maintain cyber security measures to protect the integrity of critical infrastructure for financial systems, public health, science, and safety institutions, and defense, aerospace, and intelligence agencies.

Private enterprises use cyber security and online data protection help prevent lost revenues, harm to brand reputation, and potential fines or legal liabilities.

The Conference aims to help achieve cooperative solutions and industry teaming to defend against the ever-growing cyber threat.

Learning outcomes:

Protection , Mitigation, Understanding, Sharing, Gaining, Knowing and Optimizing.



Facts & Figures About The Event

7 Speakers
7 Topics
50 Tickets

Conference Schedule

Cyber Security Summit, Toronto

X Topic Abstract

The human factor is crucial to enterprise security. Undeniably, employees represent the largest attack surface of any organization. In this session we will explore the recently released NIST guidebook on the topic, see real world examples, and walk away with actionable recommendations you can take back to your teams.


X Topic Abstract

workshop style session to talk about security risks management. Security risk management best practices How to perform threat based risk assessment How risks assessment can help in achieving compliance


X Topic Abstract

More and more organizations embracing ''digital to the core" and adopting technologies such as big data, and cloud. This has significantly raised cybersecurity risk. The traditional security model has been to secure the perimeter, however with the shifting boundaries, one of the keys to reducing enterprise risk is to build security into applications.


X Topic Abstract

Most, if not all, security breaches today need to reach out to a domain address to accomplish their malicious goals. Being able to tell if a domain can be trusted with minimal information has an immense impact on stopping an attack. This presentation will showcase the use of machine learning algorithms to determine whether a domain can be classified as good or bad with nothing but the domain name itself. The session will cover basic DNS security and machine learning concepts and provide a hands-on review of how ML can be used to learn from textual data.


X Topic Abstract

With more organizations using external vendors to perform business function that handle sensitive data, the risks have risen significantly in light of recent breaches. The session will focus on high risk control areas that should be verified for existing and potential vendors.


X Topic Abstract

Review of different cloud models
- Developing a cloud strategy
- Security, IT and Organizations considerations
- Cloud misconceptions and connecting the ecosystem
- Securing the cloud



X Topic Abstract

This talks about both the changes being proposed by NIST for standard ciphers as well as the implications QC means for cryptanalytics. The talk is called Quantum Mary of Scots. Quantum Encryption is a fast approaching, if not accessible technology requiring security experts to understand the implications it presents. We only need to look at examples of cryptanalytics milestones to see why we need to be wary. Using these quantum leaps, the audience will be entertained and educated on Quantum Cryptanalytics and what can be done TODAY to prepare our data and ourselves.




X Topic Abstract

Artificial Intelligence powered autonomous response to Cyber Threats.
Abstract: Artificial Intelligence powered autonomous response can solve three fundamental Cybersecurity challenges i.e. Complexity of the enterprise digital infrastructure, Speed of new age attacks and Overwhelmed incident responders. AI powered autonomous response is a sophisticated approach to help strained security teams cope with digital complexity and fast-moving threats like ransomware.




Our Sponsors

Use this opportunity to improve the visibility of your organization

Instant Sponsorship
Avail instant sponsorship at just USD 2000

Instant sponsorship includes
• Branding of your company as Bronze Sponsor – Company's Logo on the event page with cross link to your website.
• One Speaking Slot (45 min -non sales talk).
• 10% discount on registration fee for any delegate from your organization.
• Full day attendance at the event with lunch
• 1 x Roll up stand / Brochure distribution at the event
• Online Interview post of your company's senior executive at our media portal

For Silver, Gold Platinum & Titanium Sponsorship opportunites, please request for Sponsorship Brochure via email at contact@1point21gws.com, naveen@1point21gws.info

Our Sponsors


Media Partners


       

Digital Marketing Partner




Marketing Partner




Promotional & Media Partners


    

Our Past Sponsors


Media Partner



Sponsors






Our Speakers


John Del Grande

Sr. Director

President's Choice Financial


Salman Ashraf

Director

Travelers Canada


Nabeel Yousif

Director

goeasy Ltd


Cuneyt Karul

Director

BlueCat


Arif Hameed

Sr. Director

Equifax


Peter Scheffler

Cyber Security Solutions Architect

F5 Networks


Kunal Dixit

Senior Information Security Consultant

Multiple project





Our Pricing

Group of 3 or more(Early Bird)
USD 300 Till November 05
Group of 3 or more(Standard)
USD 349 Till December 05
Individual(Early Bird)

USD 409 Till November 05
Individual (Standard)

USD 469 Till December 05


Our Testimonial



FAQs

Who can attend Cyber Security Summit in Toronto?

This program should appeal to anyone who has a role regarding personal or confidential information – whether the information is that of a customer, employee, patient, student, job applicant or it is a trade secret or other proprietary information. Highly recommended for:

Board members
CEOs
CIOs
CFOs
HR
Information technology staff
PR departments
In-house and general counsels
Insurance and risk managers
Security Systems Integrators
IT and Cybersecurity Leaders
Integration Engineers
Product Developers and Manufacturers
Senior Technology Business Executives
Security Specifiers and Engineers
Security Consultants
Anyone who is responsible for the cybersecurity of integrated security systems!

Why to attend Cyber Security Summit in Toronto?

Following are the three key questions you and your cyber security organization or cyber security department and cyber security center of excellence should be solving for now: How do we as testers and cyber security company evolve and thrive in SMAC & IoT world?
From tooling to skilling and from strategies to fundamental values what needs to change and how? What are solutions and services available in market which I can leverage? Cyber Security Summit 2019 is an attempt to seek and share answers to these basic questions.

What will you learn about?

Learn latest techniques and skills required to test disruptive technologies from industry stalwarts themselves Latest trends, concepts, processes and tools for cyber security in SMAC & IoT Recognize, understand and acknowledge challenges in cyber security emerging technologies. Meet and network with fellow cyber security experts from leading companies.Learn how to adapt and adopt these changes quickly and swiftly within a team and also across the enterprise.

Are there any prerequisites to attend this program?

No

Do I need to register for the event?

Yes, all conference attendees must register in advance to attend the event.