The SINC Ontario IT & Security Leaders Forum will bring together the top innovative IT and Security leaders across the province for 2 days of interactive engagement. The forum will address the topics that most directly impact the resource challenges of the attendees, which in turn, will drive the growth of Ontario’s IT industry and community.
With a heightened focus on collaboration and idea-sharing, the Forum will be geared towards strengthening the IT community across Ontario, while creating beneficial networking opportunities that will contribute to the IT industry’s growth throughout the province. IT and Security service providers and executives alike will engage through innovative roundtables and panel debates.
What to expect:
- Content created by the Executive Council to ensure true front-of-mind topics are covered
- Interactive roundtables with problem-solving scenarios to help delve deeper into digital transformation strategies
- Assigned seating to ensure you engage with different people in each session and meet as many attendees as possible
- In-depth panel debates between subject matter experts to provide you with the ultimate learning experience

JW Marriott The Rosseau Muskoka Resort & Spa
Forum Agenda
Agenda may be subject to change. Check back regularly for Updates.
2:00 - 5:00 PM EST FORUM REGISTRATION & APP DEMONSTRATION
Get familiar with SINC Staff and the event layout. Secure your complimentary Swag Bag and learn how to use the Onsite Application for Peer Engagement and win great prizes!
5:30 - 7:00 PM EST WELCOME NETWORKING RECEPTION
Engage your Peers over canapés and cocktails
7:00 - 9:00 PM EST SINC NETWORKING & ENGAGEMENT DINNER
7:00 - 7:55 AM EST IT LEADERS NETWORKING BREAKFAST
Full Breakfast and lots of coffee available!
8:00 - 8:10 AM EST SINC OPENING REMARKS
A Thank You from SINC- setting the tone for a great day!
8:15 - 9:00 AM EST KEYNOTE PRESENTATION - Enabling the Institution for the Digital Economy: Key Future Trends
The world now depends on the digital economy. IT is central to the organization’s successful response and there are four pillars of strength required: re-coding the institutional DNA, treating security as survival, responding to the new relationship with work, and reducing the bureaucratic burden.
Presented by: Info-Tech Research Group
9:10 - 9:50 AM EST PRESENTATION - Zero Trust and Micro-segmentation – Easier Than You Think
Zero Trust has got to be one of the most talked about themes in cyber security. While the term means different things to different people, there are two things that can be agreed on: it’s a journey worth taking and micro-segmentation is a key pillar of that journey. The next question always is how do you get started? Regardless of the sophistication of ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network.
Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:
- Gaining visibility to where you are the most vulnerable
- Closing risky ports
- Leveraging tools you already have in place without adding layers of complexity
While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust micro-segmentation that will protect your organization and keep ransomware at bay.
Presented by: Illumio
9:50 AM - 10:05 AM EST NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack.
10:10 AM - 10:40 AM EST WORKSHOP - Cyber Challenges for the Remote Workforce
Work from home is here to stay. How do we maximize our team’s productivity in a WFH and hybrid environment?
Speaker: Zain Haq, Senior Manager – Tech & Cybersecurity Audits, Manulife Financial
10:50 AM - 11:20 AM EST WORKSHOP 1 - How AI Can Think like an Attacker
Outside agents today are using more automation, targeting external providers and shadow IT, and taking advantage of new techniques in their campaigns. As threats change, security approaches need to evolve to manage risk so you can minimize downtime, compromises, and incidents. In this session, learn how the evolution of security gives you unparalleled visibility into the parts of your business that are exposed to the outside world, allowing your security team to proactively identify vulnerabilities before an event takes place. This “outside in” perspective can help you to identify issues before they put your business at risk.
Speaker: Nabil Zoldjalali, VP of Technology Innovation, Darktrace
Presented by: Darktrace
10:50 AM - 11:20 AM EST WORKSHOP 2 - How Dinosaurs Become Oil and Other Cautionary Tales. Pragmatic Musings for Modernizing Business Processes
Your business is in danger. Be innovative or become irrelevant. This talk will be a fun look at common problems with modern businesses, how to avoid them, and how to thrive.
Metaphors to live by:
- Overcoming layer 8 and layer 9 problems (people alignment)
- Pulling the sled in the same direction (goal alignment)
- Taking inventory ( as-is & to-be of processes, and the gaps between them)
- Meteor detection, deflection, and mining (conventional and not so conventional (yet sensible) Ideas about retooling)
- New Habitats (re-imagining worlds and the enterprises that will thrive there)
Speaker: Mike Bachman, Global Architect & Principal Technologist, Boomi
Presented by: Boomi
11:30 AM - 12:00 PM EST EXECUTIVE PRESENTATION - Once More Into the Breach, My Friends
Check back for updates on this session.
Speaker: Jeff Stark, CISO, Fasken
12:00 PM - 1:05 PM EST SINC NETWORKING LUNCH
Open seating, Buffet-style lunch. Serving food for all tastes, pallets and preferences. Vegan, vegetarian, halal options available.
1:10 PM - 2:05 PM EST INTERACTIVE PANEL - Presenting Risk Management and Cybersecurity to the Board of Directors
What do you feel needs to be included when reporting to the board on cybersecurity? What should not be included? This panel will bring together current CISOs to share their best practices for an concise and effective approach to presenting cybersecurity and threat management to the board. For example, do you include information internal to your organization, as well as information on your industry? Should you include vendors and show how they’re protecting your data, services provided, or other “assets”? What does the board want to know? What do you want them to do? How do you educate the board in a respectful manner?
Moderator: Steve Magowan, Vice President – Cybersecurity, Blackberry
Panelists: Ferris Adi, Director of Cybersecurity, University of Toronto; Jeff Stark, CISO, Fasken; Mike Melo, VP IT Shared Services & CISO, Life Labs
2:10 PM - 2:40 PM EST WORKSHOP
Check back for updates on this session.
Presented by: RingCentral
2:50 PM - 3:20 PM EST WORKSHOP 1 - Data for DevOps: The Intersection of Data Automation and Data Security
Innovation driven by DevOps, cloud and application modernization emboldens businesses to expand access to the essential fuel for those programs– enterprise data. At the same time, stringent privacy laws and frequent cyber attacks, such as Ransomware, have drastically changed security postures regarding the use of sensitive data for business value. With more and more interaction shifting to the digital brand experience, how can today’s enterprises effectively unlock the power of their enterprise data and eliminate friction between data usage and data security? Join this interactive session led by industry leaders to discuss the cultural shift modern enterprises are actively engaged in to make data more available, secure, compliant and resilient.
Speaker: Alex Hesterberg, Chief Strategy Officer, Delphix
Presented by: Delphix
2:50 PM - 3:20 PM EST WORKSHOP 2 - Ransom-proof: Ransomware and Cyber-threat Protection for 2022
In 2021 we’ve seen major changes in the way that cyber-attacks, including ransomware, unfold. While the concerns and challenges are real, there is a framework to assist in enhancing your cyber-resiliency.
Join this session to learn about:
- Recent trends for protecting your organization from malicious attacks
- Best practices to put your data in a better position mitigate and remediate against ransomware
- Lessons learned from actual ransomware attacks
- And more!
Presented by: Veeam
3:30 PM - 4:00 PM EST WORKSHOP 1 - Addressing Cybersecurity Challenges in Open Source Software
Open source software (OSS) has had a tremendous impact on the development and distribution of the software we depend on today. Through its collaborative and open way of both developing and sharing software components, OSS has served as a key engine for innovation and encouraged the widespread reuse and sharing of core software components. Organizations of all sizes are heavily reliant on software, and much of that software supply chain consists of open source software components. Because of this, open source software has cybersecurity implications.
Snyk partnered with The Linux Foundation to develop a report that focuses on OSS security perspectives and how to improve OSS security and sustainability.
We’ll discuss key data points surrounding:
How organizations are addressing and prioritizing their cybersecurity needs
The most important ways to improve open source software security
Who should be driving open source software security policies
Presented by: Snyk
3:30 PM - 4:00 PM EST WORKSHOP 2 - Enforcing a Strong Zero-Trust Ransomware Defese
In a zero-trust world, you have to assume that attackers are already in your network. These threat actors are living off the land, using legitimate pathways to start and progress their attacks. Increasingly, the attacker’s goal is to get into your network and stay there to explore, probe, eventually ransomware, and exfiltrate data. Join this session to learn about the strong and highly differentiated lateral security defense that sees more and therefore stops more, finding and evicting threat actors before they can do damage. Built on the principles of the cloud operating model, this solution delivers better security.
Speaker: Bhanu Vemula, Director, Product Marketing, VMware
Presented by: VMware
4:00 PM - 4:15 PM EST NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack.
4:20 PM - 5:00 PM EST INTERACTIVE PANEL - Cybersecurity for the Future of Our Transportation (Risk Mitigation for IoT Devices)
5:30 PM - 6:20 PM EST SINC NETWORKING RECEPTION
Engage your Peers over canapés and cocktails
6:30 PM - 9:00 PM EST SINC NETWORKING & ENGAGEMENT DINNER
8:00 AM - 8:55 AM EST IT LEADERS NETWORKING BREAKFAST
Full Breakfast and lots of coffee available!
9:00 AM - 9:55 AM EST INTERACTIVE ROUNDTABLE & PANEL - Diving Into Talent Acquisition, Diversity, and Retention
30-minute open table discussion followed by a 25-minute panel to present individual table findings
When companies are limited in their thinking or their mindset towards a diverse and equitable, and inclusive workforce, they’re limiting the top talent that they can actually recruit to their organization.
With hiring talent and proficient employees at a premium, this session will address the intersection between promoting diversity and its impact on creating a better, more efficient and diverse organization.
Topics include:
- Reviewing talent acquisition and retention strategies
- Creating space for cultural shifts to take place
- What is leaderships role in diversity, equity and inclusion in the workplace?
- DE&I Challenge – Addressing resistance to change
Moderator: Claude Sam-Foh, Chief Architect, Centennial College
Panelists: Chine Nkado, Manager, Business Intelligence, Region of Peel
10:00 AM - 10:30 AM EST WORKSHOP 1
Check back for updates on this session.
Presented by: Zoom
10:00 AM - 10:30 AM EST WORKSHOP 2 - A Global Shift Left in API Security
As business and technology teams around the world drive cloud adoption and implement modern application architectures, the security vulnerabilities of the sprawling IT stack multiply as visibility dwindles. Now is the time to explore new applications and API security strategies to proactively reduce risk, secure the environment, and capitalize on cloud-native capabilities to meet these challenges for a global workforce.
Join this session to discuss:
- Managing the lifecycle of API risks
- Defending against API attacks
- Developer-led API security practices
Speaker: Marc Maresky, Senior Account Executive, Noname Security
Presented by: Noname Security
10:40 AM - 11:10 AM EST WORKSHOP - Incident Response Playbook
Ransomware is a top concern for executives. However, most ransomware victims were aware they were vulnerable, but failed to close the gaps until it was too late. This session will discuss how to stay better prepared for the unthinkable and how to align the Infrastructure and Security teams to have one shared playbook
11:10 AM - 11:25 AM EST NETWORKING & REFRESHMENT BREAK
Circle back with your Peers on the content so far while grabbing a coffee and a snack.
11:30 AM - 12:00 PM EST WORKSHOP - The Data Fabric Story
It is often said that’s it’s the journey that matters more rather the outcome, yet in enterprise settings it’s the successful outcomes that drive innovation and future investments.
Low success rates of AI/ML projects and complexity of their executions are often key reasons why LOB’s (Lines of Business) are hesitant in investments necessary to redefine and modernize their businesses.
Admittedly, challenges are overwhelming; data silos, wide landscapes of data repositories, regulatory compliance, and lack of IA (Information Architecture) often become roadblocks to successful projects.
Meet Data Fabric; an architecture that facilitates the end-to-end integration of heterogenous data pipelines and cloud environments through the use of intelligent and automated systems.
Data fabric’s architectural approach simplifies data access in an organization to facilitate self-service data consumption and enables definition and enforcement of IA (Information Architecture).
In this talk we will examine emerging Data Fabric architecture, the promise it brings and challenges it helps to solve. We will take a journey through all stages of application development lifecycle and discuss Data Fabric role in each of them.
From definition and enforcement of IA (Information Architecture), through decentralized and governed data access, to seamless integration with ML/AI lifecycle, Data Fabric architecture will help us integrate, eliminate data and organization silos, and drastically reduce time to value while providing observability and lineage of data lifecycle.
Speaker: Piotr Mierzejewski, Vice President Development Watson Applications, Cognos and Planning Analytics IBM Data & AI, IBM
12:10 PM - 12:40 PM EST WORKSHOP - Journey to the Cloud
Business leaders are constantly challenging their IT organizations to accelerate innovation while reducing costs and increasing performance. Migrating to the cloud offers many benefits, including cost efficiency and seamless scaling with a much lower risk of downtime or disruption. Often, data modernization projects stall because of unforeseen costs and challenges. IT teams consistently benefit from working with Onica’s experienced cloud engineers. They can architect and design a proper cloud database environment that meets these objectives and work with your team to ensure success.
How can organizations navigate this journey to achieve a successful cloud migration?
Key Takeaways:
Identify your database modernization challenges
Explore database modernization trends and options
Learn how to build a strategy to migrate and modernize legacy on-premises databases in the cloud.
Speaker: Bojan Andjelkovic, Senior Customer Solutions Architect, Onica by Rackspace Technology; Pierre Collard, Partner Solutions Architect (AWS Architect Pro, CCIE Enterprise), Amazon Web Services (AWS)
12:40 PM - 1:30 PM EST SINC NETWORKING LUNCH
Canada Executive Advisory Council

Derek Cullen
CIO
Stikeman Elliott

Geoffrey Ren
CIO
Canadian Red Cross

Alexander Popov
VP, IT
Sonepar Canada

Alexandre Lupien
CIO
Bibliothèque et Archives Nationales du Québec

Anju Bissessur
Vice President, CIO
IPEX Management, Inc.

Hadi Tchekiken
COO & CIO
Canada Direct

Helen Knight
Founder & CEO
Helen Knight Consulting

Gerry Dimnik
Vice President & CIO
Mount Sinai Health System

Pradeep Nair
Managing Director, Advancement Services
University of British Columbia
Interested in speaking? Please submit a request.
Submit RequestInterested in sponsoring? Please submit a request.
Submit RequestForum Sponsors
- platinum Sponsor
- gold Sponsor
- silver Sponsor

platinum
Illumio
Illumio, the pioneer and market leader of Zero Trust Segmentation, stops breaches from becoming cyber disasters. Illumio Core and Illumio Edge automate policy enforcement to stop cyberattacks and ransomware from spreading across applications, containers, clouds, data centers, and endpoints. By combining intelligent visibility to detect threats with security enforcement achieved in minutes, Illumio enables the world’s leading organizations to strengthen their cyber resiliency and reduce risk.
More From Illumio:
Illumio Corporate Overview Visibility and Ransomeware Containment
Learn More
gold
Delphix
Data is critical for testing application releases, modernization, cloud adoption, and AI/ML programs. Delphix provides an automated DevOps data platform, masking data for privacy compliance, securing data from ransomware, and delivering efficient, virtualized data for CI/CD and digital transformation. More From Delphix: Delphix DevOps Data Platform Increases Revenue by $14 Million, Slashes Cost of Data Operations by $15 Million Delphix for Test Data Management
Learn More
gold
Darktrace
Darktrace, a global leader in cyber security AI, delivers world-class technology that protects over 6,500 customers worldwide from advanced threats, including ransomware and cloud and SaaS attacks. The company’s fundamentally different approach applies Self-Learning AI to enable machines to understand the business in order to autonomously defend it. More From Darktrace: Autonomous Response, Everywhere Stages of a Ransomware Attack
Learn More
gold
Veeam
Veeam® is the leader in backup, recovery and data management solutions that deliver Modern Data Protection. They provide a single platform for cloud, virtual, physical, SaaS and Kubernetes environments. Their customers are confident their apps and data are protected and always available with the most simple, flexible, reliable and powerful platform in the industry.
Learn More
gold
Boomi
Boomi instantly connects everyone to everything, anywhere with its cloud-native, unified, open, and intelligent platform. Boomi’s integration platform as a service (iPaaS) is trusted by more than 20,000 customers globally for its speed, ease-of-use, and lower total cost of ownership. As the pioneer at fueling intelligent use of data, Boomi’s vision is to make it quick and easy for customers and partners to discover, manage, and orchestrate data, while connecting applications, processes, and people for better, faster outcomes. For more information, visit www.boomi.com. More From Boomi: ERP Modernization: An App and Data Integration Story Case Study – WWZ Innovates Its CableInternet Services by Modernizing Its SAP Data Ecosystem
Learn More
gold
Snyk
Snyk is the leader in developer security. They empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Their developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk’s Developer Security Platform automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams. Snyk is used by 1,200 customers worldwide today, including industry leaders such as Asurion, Google, Intuit, MongoDB, New Relic, Revolut and Salesforce.
Learn More
gold
VMware
VMware is a leading provider of multi-cloud services for all apps, enabling digital innovation with enterprise control. As the trusted foundation to accelerate innovation, VMware meets customers where they are. Instead of tradeoffs and compromise, VMware’s software offers businesses the flexibility and choice they need to build the future.
Learn More
gold
Noname
The Noname API Security Platform is the only solution to proactively secure your environment from API security vulnerabilities, misconfigurations, design flaws, and provides API attack protection with automated detection and response.
Learn More
gold
RingCentral
RingCentral, Inc. (NYSE: RNG) is a leading provider of business cloud communications and contact center solutions based on its powerful Message Video Phone (MVP ) global platform. More flexible and cost-effective than legacy on-premises PBX and video conferencing systems that it replaces, RingCentral empowers modern mobile and distributed workforces to communicate, collaborate, and connect via any mode, any device, and any location. RingCentral offers three key products in its portfolio including RingCentral MVP , a Unified Communications as a Service (UCaaS) platform including team messaging, video meetings, and cloud phone system; RingCentral Video , the company’s video meetings solution with team messaging that enables Smart Video Meetings; and RingCentral Cloud Contact Center solutions. RingCentral’s open platform integrates with leading third-party business applications and enables customers to easily customize business workflows. RingCentral is headquartered in Belmont, California, and has offices around the world.
Learn More
silver
Okta
Okta is the leading independent identity provider. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time. With more than 7,000 pre-built integrations to applications and infrastructure providers, Okta provides simple and secure access to people and organizations everywhere, giving them the confidence to reach their full potential. More than 10,000 organizations, including JetBlue, Nordstrom, Siemens, Slack, T-Mobile, Takeda, Teach for America, and Twilio, trust Okta to help protect the identities of their workforces and customers.
Learn More
silver
Cohesity
Cohesity radically simplifies data management. We make it easy to protect, manage, and derive value from data –across the data center, edge, and cloud. We offer a full suite of services consolidated on one multicloud data platform: backup and recovery, disaster recovery, file and object services, dev/test, and data compliance, security, and analytics — reducing complexity and eliminating mass data fragmentation. Cohesity can be delivered as a service, self-managed, or provided by a Cohesity-powered partner.
Learn More