Please see below the tentative schedule for the 2017 ISACA Information Security & Risk Conference
Conference Day 1 | |||
---|---|---|---|
8:00 | Onsite Registration and Coffee / Exhibit Area Open | ||
8:30 – 8:45 | Master of Ceremonies: Welcome and Review of Conference Organization | ||
8:45 – 9:30 | Keynote #1 – Patrick Gray, Former FBI Supervisory Special Agent | ||
9:45 – 10:45 | RSA Hunting Methodology: A Key to the Labyrinth of Network Forensics | Digital Defence Making Incident Response Effective Again | NMP Are you hackable or uncrackable? |
10:45 – 11:00 | Morning Break / Vendor Booths / Networking | ||
11:00 – 12:00 | iovation Inc. Will Your FitBit Replace Your Password? How the ‘IDentity of Things’ Will Usher in the Next Wave of Multifactor Authentication | KPMG Enterprise Risk Management for Cloud Computing | NB Power Cybersecurity Risk: from Server Room to Boardroom |
12:15 | Lunch | ||
12:30 – 13:15 | Keynote #2 – Melissa Sariffodeen - Ladies Learning Code | ||
13:15 – 13:30 | Afternoon Remarks | ||
13:45 – 14:45 | McAfee What is Machine Learning? | Province of Nova Scotia Expanding Advisory Services in your Internal Audit Practice | Beauceron Security Patching your people: building a technology to support going beyond user awareness and towards accountability |
14:45 - 15:15 | Afternoon Break / Vendor Booths / Networking | ||
15:15 - 16:15 | Duo Security Realizing Software Security Maturity: The Growing Pains & Gains | Mariner Security Solutions IoT - Standards, Risks and Why we Need to Address Both | Securicy Hacking InfoSec Policies: Cutting Through The Jargon |
16:30 - 17:30 | Rogers Trends in Breach incident management | Bulletproof Importance of a Cohesive Information Security Program (C-ISP) | Watchguard What is made of 8 billion parts and vulnerable to 2000’s era Wi-Fi attacks? Every Wi-Fi radio on the planet |
Conference Day 2 | |||
---|---|---|---|
8:00 | Onsite Registration and Coffee / Exhibit Area Open | ||
8:30 – 8:45 | Master of Ceremonies: Welcome and Review of Conference Organization | ||
8:45 – 9:30 | Keynote #1 – Sean McGurk, ICS-ISAC | ||
9:45 – 10:45 | Symantec Turning a Trillion Rows of Security Threat Data into Gold | Province of New Brunswick A Plan to Implement Enterprise Risk Management | KPMG Critical Security Controls: Planning, Implementing, and Auditing |
10:45 – 11:15 | Morning Break / Vendor Booths / Networking | ||
11:15 – 12:15 | Information in Bloom Management Services Managing the Chaos: Disaster Recovery for Your Data | PwC Canada Data Assurance and Analytics within Risk Assurance | Forcepoint Cloudy with a Chance of Visibility, Accountability and Security |
12:30 | Lunch | ||
12:45 – 13:30 | Keynote #2 – Frank Schettini, ISACA Chief Innovation Officer | ||
13:30 – 13:45 | Afternoon Remarks | ||
14:00 – 15:00 | Dalhousie University From Visualization to Visual Analytics: Making Information More Accessible | Nehemiah Security You can measure anything...but what if it’s not the RIGHT thing? | Watchguard The Power of Network AND Endpoint Threat Correlation |
15:00 - 15:30 | Afternoon Break / Vendor Booths / Networking | ||
15:30 – 16:30 | Darktrace The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense | GoSecure On the Prowl: Practical Threat Hunting | Carbon Black Does Your Security Posture Stand Up to Tomorrow’s New Threat? |
16:45 – 17:30 | Master of Ceremonies - Event Closure |