DataConnectorsToronto 2020 May 28, 2020 to May 29, 2020, Toronto, Canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Panel: Fariba Rawhani, Madeleyne Vivanco, Mike Glover, Ross Davidson, Shadi Khatib, Sachin Jain N/a None
Your CEO is Not Your CEO! How to defend against email fraud Denis Ryan Email fraud leads to two main threats- one is Business Email Compromise (BEC) where attackers ...
Evolution of An Attack: How a Persistent Threat Actor Adapts to Fool Microsoft Michael Landewe The arms race between email attackers and defenders is a long and expensive one. In ...
Identity and Access Management: Embracing the complexity Matthew Marji Admittedly, IAM can be intimidating. Ensuring company assets are being accessed only by those who ...
The Impossible Puzzle of Cybersecurity Darryl Maurice With IT teams around the world struggling to keep up with the latest cybersecurity threats, ...
Driving the End Game in Cyber Hygiene Greg Jackman Critical labor shortages in Cyber Security have created unprecedented demand for solutions to deliver real-time ...
Risk Management – Insights in a World Gone Crazy Phil Richards Join Phil Richards, CISO for Ivanti, as we discuss key concepts and strategies for Risk ...
Canadian Cybercrime Awareness and Prevention in 2020 Sgt. Vern Crowley The rapid advancement and penetration of cyber and digital technologies is changing the world, and ...
The IoT storm … Will we survive the coming deluge? Robert Falzon IoT devices permeate the most intimate aspects of our everyday lives. Now more than ever ...
Shifting PAM into High Gear with Zero Standing Privilege (ZSP) Paul Lanzl Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be ...
The Last Line of Defense: The Importance of having a robust and comprehensive Data Protection strategy David Huskisson Data protection is experiencing a resurgence. Historically its been seen as an innovation backwater and ...
How to counter data theft by eliminating the insider threat Simon Cuthbert Insider threats are among the top IT security risks organizations today must brace for. Conventional ...
Acceleration of digital transformation by COVID-19 Tony Anscombe In response to “work from home” and other lockdown measures due to the COVID-19 pandemic, ...
Shift Left – Building Security into the Application Development Lifecycle Rob Arago By building security into your application development lifecycle you not only help reduce your attack ...
Managing Digital Risk in Transformative Times Ben Smith Digital transformation is not only changing how companies think about business. It is changing how ...
Improving Security for Remote Working – 13 Key Recommendations Matt Gardiner Many organizations are in the middle of a work from home (WFH) trial by fire. ...
Achieving Secure Remote Access with RDP Gil Azrielant With so many employees sheltering in place due to the coronavirus, enterprises with Windows are ...
Building an Effective Cyber Training Program for Your Cyber-Pros Gordon Lawson In the cybersecurity triad of people, process, and technology, much time and money is spent ...
Cybercrime In a post-pandemic world Detective Bagnall This presentation will take a 360 degree look at how Cybersecurity needs have changed and ...