First round of speakers announced!!

We are thrilled to announce our first round of presenters for the 2018 ISACA Information Security & Risk Conference. We have had an overwhelming number of speakers submit some amazing talks. We still have the second round open until August 17, 2018 – so feel free to submit a talk. Here are the list of presenters. We will be publishing their abstracts and bios shortly.

  • Michael Wylie, Corporate Blue (US)
    • The Costly Mistakes of Being Unprepared
    • Fly Twitter Airlines
  • Tarek Habib, KPMG LLP (Canada)
    • A practical approach to business resilience: crisis management, business continuity and disaster recovery
  • Sunny Jamwal, MNP (Canada)
    • Subsistence* Living using PowerShell and WMI
  • Tim Dickinson, Sailpoint (Canada)
    • The Identity Utopian Trifecta: the power of identity context
  • David Chmielewski, illumio (US)
    • Stop Cyber Threats with Adaptive Micro-Segmentation
  • Andrew Kozma, Halifax Regional Police Department (Canada)
    • Aligning your security program to meet organizational objectives
  • Patrick McBride, Claroty (US)
    • The Perfect Storm – a look at operational technology security
  • Victoria McIntosh, Bloom Management Solutions (Canada)
    • Mirror, Mirror, on the Wall, Is Facial Recognition the Right Authenticator for All?
  • Darryl McLeod, Securicy (Canada)
    • The Security Questionnaire: To Do or Not To Do
  • Jamie Rees, NB Power (Canada)
    • Cybersecurity apprenticeship – tackling the talent gap
  • Wilco Van Ginkel, a3i (Canada)
    • Trust or not to trust in AI – that’s the question!
  • Lilly Chalupowski, GoSecure (Canada)
    • Don’t RAT me Out
  • Erik Denis, University of New Brunswick (Canada)
    • From the trenches: security case studies
  • Elaheh Samani, Google (Canada)
    • What is my “Cute kitten” really doing?! A recipe to dissect Chrome Extensions.
  • Anthony English, Mariner Security Solutions
    • Third Party Due Diligence
  • Keith Rayle, Fortinet (US)
    • Swarm vs. Hive – The Cyberwarfare Landscape of Today
  • Roger G. Johnston, Right Brain Sekurity (US)
    • How to Have Lousy Security: A Vulnerability Assessor’s
      Perspective
  • Shira Shamban / Grant Asplund, Dome9 (US)
    • Gone in 127 Minutes – Why Ephemeral Infrastructures Need Native Visibility, Security and Compliance