By bringing together the top 80 Executives in the region, we will discuss the most pressing Technology and Leadership challenges we face in an ever-evolving corporate landscape.
Over the next two and a half days, we will nurture meaningful relationships and tackle the challenges inherent to IT in a smaller, more dynamic setting. You will learn from your peers through various workshops, panels, roundtables and presentations. Our closed-door policy fosters an environment where all discussions are confined within the Forum walls, enabling more genuine and engaged conversations.
Learn about the latest and most innovative technologies that can bridge some of your organizational gaps through qualified one-on-one engagements, scheduled strategically throughout the Forum and selected by you, based on your most pressing needs.
Build new relationships and nurture existing ones, share in your successes and commiserate in the challenges that we all face as IT Leaders.
Join us for the Canada IT & Security Leaders Forum and leave ready to inspire action within your Organization!
The Rimrock Resort Hotel
Located just minutes from Banff Upper Hot Springs and the Banff Gondola, The Rimrock Resort Hotel offers an elevated escape close to some of the area’s premier attractions and activities, including golfing, skiing, hiking, biking, and more. Discover a nature-immersed retreat with each stay at this AAA/CAA Four Diamond resort in the heart of the Banff National Park.
Forum Agenda
Agenda may be subject to change. Check back regularly for Updates.
2:00 PM - 5:00 PM EST
FORUM REGISTRATION & APP DEMONSTRATION
Get familiar with SINC Staff and the event layout. Secure your complimentary Swag Bag and learn how to use the Onsite Application for Peer Engagement and win great prizes!
5:30 PM - 7:00 PM EST
SINC WELCOME NETWORKING RECEPTION
Engage your Peers over canapes and cocktails
7:00 PM - 9:00 PM EST
SINC NETWORKING & ENGAGEMENT DINNER
7:00 AM - 7:55 AM EST
SINC IT LEADERS NETWORKING BREAKFAST
Full breakfast and lots of coffee available!
8:00 AM - 8:05 AM EST
SINC OPENING REMARKS
A Thank You from SINC – setting the tone for a great day!
8:05 AM - 8:55 AM EST
KEYNOTE PRESENTATION - Enabling the Institution for the Digital Economy: Key Future Trends
As the digital economy continues to expand, institutions must adapt to remain competitive and relevant. This session will explore the key trends shaping the future of the digital economy and how institutions can effectively enable their digital transformation. Topics will include advancements in digital infrastructure, the integration of artificial intelligence and machine learning, the importance of data analytics, and the shift towards digital-first business models. Experts will discuss the challenges and opportunities presented by these trends, providing practical insights on how institutions can leverage technology to enhance efficiency, innovation, and customer engagement. Attendees will gain a comprehensive understanding of the strategic steps necessary to thrive in the digital economy.
Moderator: Shweta Shah, Chief Data Architect, Sunlife
9:05 AM - 9:35 AM EST
WORKSHOP 1 - Stop Trying to Boil the Ocean; Making Better Risk Decisions to Prevent Future Cyber Attacks
Discussing traditional approaches to Risk Management and why they are less and less effective as technology gets more complex and attacks get harder to detect. Including:
- Gaining comprehensive visibility across the modern attack surface
- Anticipating threats, identifying exposures and prioritizing efforts to prevent attacks
- Communicating cyber risk up and down the organization to help make better risk decisions
Speaker: Bob Huber, Chief Security Officer, Tenable
Presented by: Tenable
9:05 AM - 9:35 AM EST
WORKSHOP 2 - Achieving Next-Gen Business Outcomes with IoT & Blockchain
Learn how to harness decentralized technologies to tranform your business. Understand how IoT & Blockchain work together to ensure security, transactional integrity, while reducing total cost of operations to near zero. During this session, you’ll engage in the process of building a Decentralized Autonomous Organization- brining the pieces together to provide a foundation to understand opportunities & risks as your organization drives to Next-Gen business.
9:45 AM - 10:15 AM EST
WORKSHOP 1 - Cyber Defense Strategies for Earlier Detection and Faster Response
Delve into the flaws of the traditional cybersecurity landscape and how a modern SOC should focus on outcome-based services without relying on logs or the cost and complexity of a SIEM
Presented by: LMNTRIX
9:45 AM - 10:15 AM EST
WORKSHOP 2 - Ransomware Attacks in Real Life: How to Prepare, What to Expect
We’ve seen major changes in the way that cyber-attacks, including ransomware, unfold. While the concerns and challenges are real, there is a framework to assist in enhancing your cyber-resiliency.
Join Veeam in this session to learn about:
- Recent trends for protecting your organization from malicious attacks
- Best practices to put your data in a better position mitigate and remediate against ransomware
- Lessons learned from actual ransomware attacks
- And more!
Presented by: Veeam
10:15 AM - 10:30 AM EST
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee or tea and a snack
10:35 AM - 11:05 AM EST
WORKSHOP 1 - Achieving the Benefits of Converged Endpoint Management
Managing endpoint risk and compliance is more challenging today than ever before. Today’s CISOs have to manage risk from many thousands of globally distributed, heterogeneous assets, while also responding to ever increasing audit scrutiny and regulatory compliance requirements.
Join this session, Achieving the Benefits of Converged Endpoint Management, to learn more about how to:
- Identify & remediate risks that create the greatest exposure.
- Assess & measure unknown vulnerabilities.
- Maximize IT budgets and staffing during economic uncertainty.
- Enhance existing investment in strategic technology vendors.
Presented by: Tanium
10:35 AM - 11:05 AM EST
WORKSHOP 2 - Is Your Roadmap Business-Driven or Vendor Dictated?
Today, the primary CEO priority is growth, with technology as a key enabler. However, vendor policies pose major roadblocks to innovation, growth and competitive advantage by forcing you to spend limited budget, resources and time on projects that may not drive your business. Learn how you can take control of your IT roadmap by choosing a Business-Driven Roadmap designed around your business objectives and not the vendor’s. Leverage vendor software, but do it on your terms, on your timetable and with the flexibility, funding and freedom to focus on initiatives that support growth and competitive advantage.
11:15 AM - 11:45 AM EST
WORKSHOP 1 - How to Secure the AI Environment: Looking at New risks and Controls
Check back for updates on this session.
Speaker: Simon Sulyma, AVP, Information Risk Management, Manulife
11:15 AM - 11:45 AM EST
WORKSHOP 2 - AI in the Enterprise- Identifying Winning Business Cases
Enterprises have hordes of data and many opportunities to integrate other data sources. But readying data for AI experimentation is expensive and requires an iterative approach. This session will focus on finding the best opportunities to experiment with AI and on applying agile practices in machine learning initiatives.
11:55 AM - 12:45 PM EST
ROUNDTABLE + PANEL - Driving The Business Through Technology
It is no secret that technology is changing the fabric of business operations and outcomes, and collaboration between IT and the business is more important than ever before. The conversation is no longer about how to align IT with the business, however in many cases technology is still viewed as a commodity rather than an enabler. So what can we do to successfully change this mindset both within our own organizations and across the industry as a whole? During this session, we will discuss the various challenges IT and digital leaders face when undergoing this cultural shift.
Panelist: Dan Dickinson, CIO, BioScript
12:45 AM - 1:35 PM EST
SINC NETWORKING LUNCH
Open seating, Buffet-style lunch. Serving food for all tastes, pallets and preferences. Vegan, vegetarian, halal options available
1:40 PM - 2:10 PM EST
PRESENTATION - How to Build a Five Star Data Protection Program
It’s time to get serious about data protection. With breaches on the rise and sensitive data widely distributed across cloud and mobility, organizations need a solid data protection strategy more than ever. But how should you structure your data protection program to ensure you can deliver game-changing security?
Join this engaging session to learn the best strategy for building a five-star data protection program. You’ll get guidance from industry experts on cutting-edge approaches that not only provide airtight protection, but drastically reduce cost and complexity.
This session will cover:
- What the best architecture for data protection is
- How to gain complete visibility to all your sensitive data
- Strategies to secure top uses cases around data in motion and at rest
- Data protection best practices
Presented by: Zscaler
2:20 PM - 2:50 PM EST
WORKSHOP 1 - Maturing Your Identity and Access Management Program
Weak identity and access management (IAM) practices result in considerable risk to the organization because IAM plays a role in most things in IT. Organizations typically do not have a high-level understanding of how identities and access are managed within the organization and no central ownership of IAM is a common reason why. Owners of IAM actions outside of IT may be resistant to adopting change but it’s our job to convey the importance and get the buy-in needed. This session will help identify the drivers behind improving your IAM practices and develop best practice processes for each section of the identity lifecycle
Speaker: Steve Magowan, Former VP, Cybersecurity, Cineplex
2:20 PM - 2:50 PM EST
WORKSHOP 2 - Hiring and Retaining top IT & Security Talent
While the pool of talented cybersecurity professionals is increasing daily, there is still a shortage of cybersecurity professionals to go around. This sessions will dicuss how your organization can stand out from the crowd and attract the best. The session will cover the following topics: – How being an active CISO and Thought Leader is the best marketing for new talent – Creative ways to compete and assets that are important outside of salary – Increase training and access to non-cybersecurity experts that are already excelling at your company and how to determine that talent you already have in house
3:00 PM - 3:30 PM EST
WORKSHOP 1 - Risk Management in the Era of AI
This session provides a comprehensive exploration of the challenges and opportunities that arise with the integration of Artificial Intelligence (AI) in various industries. We’ll examine the intricacies of managing risks associated with AI technologies, highlighting the potential pitfalls and benefits they bring. By examining real-world examples and case studies, we’ll shed light on the complexities and ethical considerations involved in harnessing AI’s power while mitigating potential risks.
3:00 PM - 3:30 PM EST
WORKSHOP 2 - Hiring and Retaining top IT & Security Talent
While the pool of talented cybersecurity professionals is increasing daily, there is still a shortage of cybersecurity professionals to go around. This sessions will dicuss how your organization can stand out from the crowd and attract the best. The session will cover the following topics: – How being an active CISO and Thought Leader is the best marketing for new talent – Creative ways to compete and assets that are important outside of salary – Increase training and access to non-cybersecurity experts that are already excelling at your company and how to determine that talent you already have in house
3:30 PM - 3:45 PM EST
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
3:50 PM - 4:20 PM EST
WORKSHOP 1 - Challenges with Digital Currency: Enabling the Institution for the Digital Economy
The world now depends on the digital economy. IT is central to the organization’s successful response and there are four pillars of strength required: re-coding the institutional DNA, treating security as survival, responding to the new relationship with work, and reducing the bureaucratic burden.
3:50 PM - 4:20 PM EST
WORKSHOP 2 - Driving Past the Data/Privacy Divide
To ensure relevance and competitiveness in today’s customer centric market, enterprises of all types are investing heavily in customer data capture and customer data analytics capabilities. With data being captured from so many new locations and at a deeper and more personal level than ever before privacy issues become more and more important. Enterprises need to constantly review their data capture and usage to determine value vs. risk and whether the incentive offered to the customer is sufficient to overcome any reticence on their part. This session will address privacy issues, how to balance opt in vs opt out requirements and that Data Privacy certainly isn’t a roadblock to data capture but the customer incentive needs to be sufficient to justify the sharing of personal details.
4:25 PM - 5:15 PM EST
ROUNDTABLE + PANEL - Diving into Talent Acquisition, Diversity and Retention
In most markets, there is an abundance of open IT jobs with fewer people able to fill them – and the positions are getting more expensive. Working remotely is the norm, but not optimal (usually). There is less off-shoring and more resources are focused locally or within the same hemisphere.
Additionally, we are still not recruiting enough woman and minorities in to the rank and file, especially senior IT roles, and we’re losing talent to major tech hubs.
Join us at the roundtable with your peers as we dive into solutions to tackle the following challenges:
- How do you scale staff / team without losing them to major tech hubs?
- How do you create more diversity – not only among race and gender – but diversity of thought – Old vs New Thinking?
- How do we mentor universities to implement actionable steps for supplying more IT talent?
6:00 PM - 7:00 PM EST
SINC NETWORKING RECEPTION
Engage your Peers over canapés and cocktails
7:00 PM - 9:00 PM EST
SINC NETWORKING & ENGAGEMENT DINNER
8:00 AM - 8:50 AM EST
SINC IT LEADERS NETWORKING BREAKFAST
Full Breakfast and lots of coffee available!
9:00 AM - 9:50 AM EST
CISO PANEL - The Rapidly Evolving Threat Landscape
Aggressive attacks on Enterprise computer networks are continuing with increased frequency and threatening economic and national security. Actions like vulnerability reduction and passive defenses on their own simply are not cutting it and there needs to be a functional shift in the way we mitigate this substantial threat. Companies can seek to protect their most sensitive data by implementing an environment of actionable intelligence and detection to bring the fight to the adversaries and ensure a proactive approach to securing data. This session will discuss best practices in managing the constant evolution in the security environment.
Moderated by: Cyera
10:00 AM - 10:30 AM EST
PRESENTATION - Low Hanging Fruit – Improving AD Security for the Easy Win
Threat actors, Red-Teams, and Ransomware have been abusing Active Directory for years. In fact, attackers have compromised or leveraged AD in 100% of the successful ransomware attacks over the last 3 years. This discussion will discuss new technologies to help you visualize the risk in your AD and add a layer of security around this very important part of enterprise infrastructure.
10:30 AM - 10:45 AM EST
SINC NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack
10:50 AM - 11:20 AM EST
WORKSHOP 1 - A Data Driven Journey: Insights and Lessons Learned
Everyone’s journey to being data-driven is unique. It’s like making an apple pie. It’s easy to get the ingredients, but you need to know how to put together the right recipe for a great apple pie. In this interactive discussion I will share insights and lessons learned in leading data modernization initiatives and in sharing the journey with customers. Data literacy, culture, governance, quality, technology stack modernization and architecture are all ingredients in driving towards the right data driven recipe. The discussion will include tips and tricks for reducing friction points and how to build the right recipe for your organization.
10:50 AM - 11:20 AM EST
WORKSHOP 2 - From On-Prem to the Cloud: Protect Your Apps and APIs
The result of digital transformation: It’s easier to do business with your customers and partners. But with new architectures, web apps and APIs now deployed from on-prem servers to the cloud, it is harder than ever to get a holistic view of all of these potentially vulnerable assets – never mind defend them.
What are your biggest challenges today in defending these diverse assets? What are the known gaps in your current defenses? What are you seeking in the future to defend your apps and APIs?
Topics covered will include:
- How are adversaries preying upon unprotected web apps and APIs?
- How are traditional web application firewalls deployed, and what are they missing?
- What does the future look like with unified web app and API security solutions?
11:30 AM - 12:00 PM EST
PRESENTATION - Maximizing Value Vs Minimizing Cost- Building a more Valuable IT Department
To meet the speed and agility demands of digital business, CIOs are transforming their IT departments and shifting a growing share of IT work from projects to products. At the same time, growth in business-led IT has expanded the span of employees across the enterprise who are responsible for technology initiatives.
This session will explore a cost management model and discuss how evolving IT cost management efforts to focus on value over pure cost will reduce (and even eliminate) reactive calls to cut IT costs. This session will provide a model and tactics to elevate the maturity of IT to focus on value over costs, while still meeting the business directives.
12:00 PM - 1:00 PM EST
SINC NETWORKING LUNCH
Canada Executive Advisory Council
Derek Cullen
CIO
Stikeman Elliott
Geoffrey Ren
CIO
Canadian Red Cross
Alexander Popov
VP, IT
Sonepar Canada
Alexandre Lupien
CIO
Bibliothèque et Archives Nationales du Québec
Anju Bissessur
Vice President, CIO
IPEX Management, Inc.
Hadi Tchekiken
COO & CIO
Canada Direct
Helen Knight
Founder & CEO
Helen Knight Consulting
Gerry Dimnik
Vice President & CIO
Mount Sinai Health System
Pradeep Nair
Managing Director, Advancement Services
University of British Columbia
Interested in sponsoring? Please submit a request.
Submit RequestForum Sponsors
- platinum Sponsor
- gold Sponsor
- silver Sponsor
platinum
Zscaler
Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud first world. Its flagship services, Zscaler Internet Access and Zscaler Private Access, create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler services are 100% cloud-delivered and offer the simplicity, enhanced security, and improved user experience that traditional appliances or hybrid solutions are unable to match. Used in more than 185 countries, Zscaler operates the world’s largest cloud security platform, protecting thousands of enterprises and government agencies from cyberattacks and data loss.
Learn Moregold
Cyera
Cyera is the data security company that gives businesses context and control over their most valuable asset: data. As a pioneer in Data Security Posture Management, Cyera instantly provides companies visibility over their sensitive data, context over the risk it represents and their security exposure, and automated remediation to reduce the attack surface and ensure operational resilience. We are redefining the way companies secure their data.
Learn Moregold
Tenable
Tenable®, Inc. is the Cyber Exposure company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 30 percent of the Global 2000 and large government agencies.
Learn Moregold
LMNTRIX
LMNTRIX is the leader in intelligence led security-as-a-service. Working as a seamless, scalable extension of customer security operations, LMNTRIX offers a single MDR solution called Active Defense that blends their cyber defense platform called LMNTRIX XDR with innovative security technologies, nation-state grade threat intelligence and world-renowned Cyber Defence Centers. With this approach, LMNTRIX eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent and respond to cyberattacks.
Learn Moregold
Tanium
Tanium, the industry’s only provider of converged endpoint management (XEM), leads the paradigm shift in legacy approaches to managing complex security and technology environments. Only Tanium unifies teams and workflows and protects every endpoint from cyber threats by integrating IT, Operations, Security, and Risk into a single platform that delivers comprehensive visibility across devices, a unified set of controls, and a common taxonomy for a single shared purpose: to protect critical information and infrastructure at scale.
Learn Moregold
Veeam
Veeam® is the leader in backup, recovery and data management solutions that deliver Modern Data Protection. They provide a single platform for cloud, virtual, physical, SaaS and Kubernetes environments. Their customers are confident their apps and data are protected and always available with the most simple, flexible, reliable and powerful platform in the industry.
Learn Moresilver
OutSystems
OutSystems is a global leader transforming how companies innovate through software, empowering IT leaders with a better way to build the software that matters most. The OutSystems platform helps companies develop, deploy, and maintain mission-critical applications by unifying and automating the entire software lifecycle. With OutSystems, organizations leverage GenAI to deliver software instantaneously, adapt faster to changing requirements, and reduce technical debt by building on a future-proof platform. Helping customers achieve their business goals by addressing key strategic initiatives, OutSystems delivers software up to 10x faster than traditional development. Recognized as a leader by analysts, IT executives, business leaders, and developers around the world, global brands trust OutSystems to tackle their impossible projects and turn their big ideas into software that moves their business, people, and the world forward.
Learn More