Privacy&SecurityConference 2019 Feb. 6, 2019 to Feb. 8, 2019, Victoria, Canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Presentation: Big Data, Big Responsibility Jeff Jonas The EU’s General Data Protection Regulation (GDPR) went into effect May 25, 2018. The new ...
Keynote Presentation: The Essential Need to Embed Privacy and Security, by Design Ann Cavoukian The GDPR has raised the bar dramatically for privacy and data protection, returning control back ...
Concurrent Keynote Presentation by F5 Networks: Making Application Threat Intelligence Practical Preston Hogue The daily volume of cyber-attacks targeting applications and frequency of associated breaches is overwhelming to ...
Concurrent Keynote Presentation by Deloitte: Data: Friend and Foe in the Fight Against Cybercrime Rob Wainwright Convergence: the integration of physical and cyber risks to enable cybercrime, financial crime and terrorism ...
Concurrent Keynote Presentation by IBM: Is Your SOC Overwhelmed? Artificial Intelligence and MITRE ATT&CK Can Help Lighten the Load Adam Frank Security analysts are challenged to sift through thousands of security alerts to investigate and accurately ...
Concurrent Panel Session - Panel A: Artificial Intelligence - Should Canada Be A Leader Developing Ethical Standards For AI? Pamela Snively , Joyce Drohan , Dr. Teri Fisher , Keith Jansa , Shankar Narayan Will Canada’s adoption of AI in the Public Sector ensure it is governed with clear ...
Concurrent Panel Session - Panel C: Should Your Health Data Be Managed on A Blockchain? Dr. Robert Fraser , David Furlonger , John Jordan , Dr. Vistoria Lemieux Blockchain has promise to overcome many of our current healthcare data and records management challenges. ...
Luncheon Keynote Presentation: Freedom™ - Security and Privacy in 2030 Nikolas Badminton Nikolas Badminton will discuss how our current trajectory towards a world where data, privacy, surveillance, ...
Keynote Presentation by OneTrust: CCPA & GDPR - Overlaps and Gaps to Consider in Your Harmonized Privacy Program Doug Botkin The California Consumer Privacy Act (CCPA) is outlines new privacy rights for consumers and requirements ...
Applied Session by Cisco: Passive and Active Defense Jason Maynard Most organizations (IT/OT) are focused on building out their security posture leveraging passive defensive capabilities ...
Applied Session by RSA: Privacy, Security, Risk and the Digital Revolution Dan Carayiannis The future of privacy in the ever evolving digital age presents government organizations with plenty ...
Applied Session by IBM: Modern Realities of Securing Active Directory & the Need for AI Dustin Heywood Over the last 5 years assumptions about active directory have been challenged and a new ...
Applied Session by Carbon Black: The Pilot’s Checklist – Suppressing Risk in a New Age of Threats and Regulations Jason Madey The leading cause of data breaches is not pure hacking attempts – it’s from neglecting ...
Applied Session: Cybersecurity Update: Phishing to Ransomware – Looking Ahead: 2019 and Beyond Kevin Murphy Ransomware: Will your company become the next Atlanta? Learn and discuss the latest best practices ...
Applied Session: Creating Equity for Women & Minorities in Information Security Marceline Cock Women and minorities are vastly underrepresented in the Information Security workforce. Figures show just 11-20 ...
Applied Session by Kaspersky Lab: Threat Mitigation and The Current Threat Landscape Larry Chin A discussion on the current threat landscape, the threats that organizations are currently facing and ...
Applied Session: Understanding Video Surveillance, Site Security, and Reasonable Expectation of Privacy Dr. Kelly Sundberg Property owners and managers increasing are using video surveillance as a central means to achieve ...
Concurrent Panel Session - Panel A: FinTech: Perils and Opportunities Robin Gould-soil , Joni Brennan , Andre Boysen The rapid and often disruptive development of technological advances is fundamentally changing the financial landscape ...
Concurrent Panel Session - Panel B: Women in Technology: Creating a New Normal Bonnie Butlin , Sherry Rumbolt , Ashley Tolbert , Kristin Wilkes What would a more gender-inclusive technology sector look like and act like? This engaging panel ...
Concurrent Panel Session - Panel C: Smart Cities: Soon to Be a Reality, But Are We Ready for Them? David Izzard , Dr. Ann Cavoukian , Dr. Andrew Clement The 21st-century knowledge-based and data-driven economy is all about IP and data. “Smart cities” are ...
Opening Introductions: Privacy, Big Data, and Politics in the Digital Age Michael Mcevoy Michael McEvoy, British Columbia’s Information and Privacy Commissioner, will focus on today’s dramatically shifting privacy ...
Keynote Presentation: Privacy and Our Democracy Greg Smolynec In his address, Deputy Commissioner Smolynec will discuss how privacy goes beyond narrow obligations to ...
Keynote Presentation by Microsoft: Unleashing Trusted Innovation on the Shoulders of Experience John Weigelt The past 20 years has seen two decades of both rapid technical innovation as well ...
Concurrent Keynote Presentation by Cisco: Security in the Age of Cyberwarfare Rob Barton As the world is becoming hyperconnected new efficiencies and opportunities are emerging, however this increases ...
Concurrent Keynote Presentation by PwC: Critical Infrastructure Kung-Fu: Evaluating Attacks and How to Defend Chad Gray Industry 4.0 and the new digital age. The new revolution of technology and innovation is ...
Concurrent Panel Session - Panel A: Politics and Privacy Regulation Dr. Bennett , Michael Fenrick , Rachel Roy , Mitch Wexler The Facebook/Cambridge Analytica controversy reveals that political parties and campaigns thrive on personal data. Politicians ...
Concurrent Panel Session - Panel C: Is Canada a Global Leader in Cyber Security? Scott Jones , Benjamin Bergen , Christian Leuprecht , Coleman Mehta The Government of Canada’s national cyber security strategy outlines a working relationship with the provinces ...
Applied Session: “Real-World” De-Identification of Transactional Data Extracted from Electronic Health Records - Breaking the Curse of Dimensionality Dr. Moselle Researchers who seek to detect better practices or predict better outcomes from "real world" data ...
Applied Session by Varonis: The Modern State of Insecurity Derek Keen Online security is in a constant state of flux; we face threats today that are ...
Applied Session by PwC: The New NAFTA - A Continental Market in Data, and Practical Implications for Privacy Constantine Karbaliotis The new NAFTA - USMCA, CUSMA or T-MEC, depending on what country you're in - ...
Applied Session by Oracle: What is a 2nd Generation Data Centre? (how to deliver superior privacy in a public data centre) Rob Taylor Oracle has built a second generation cloud infrastructure - in Canada - that meets the ...
Applied Session: Addressing Privacy Concerns as the City of Winnipeg Combines Innovation, Connectivity & Data for Service Improvement - A Case Study Ryan Smith Seven years ago Winnipeg’s 650 signalized intersections were looked after by one man, Construction ruled ...
Applied Session: Update on International Privacy Developments - Innovation, Science and Economic Development Canada (ISED) Jane Hamilton N/A
Concurrent Panel Session - Panel A: Quantum Computing Will Create Jobs but Which Ones? Alan Baratz , Dr. Michele Mosca , Dr. Stephanie Simmons Quantum computing is the attempt to harness the laws of quantum mechanics to build incredibly ...
Concurrent Panel Session - Panel B: The Ethics of Integrated Data Kenneth Moselle , Hayden Lansdell , Dr. Kimberlyn Mcgrail , Michael Vonn If data is the new oil, is it being ethically extracted, consumed and made available? ...
Closing Keynote Presentation Richard Clayton N/A