Schedule

The schedule for the 2018 ISACA Security & Risk Conference will be posted shortly.

Day 1 - Monday, Oct. 29, 2018
7:45Onsite Registration and Coffee / Exhibit Area Open
8:30 – 8:45Master of Ceremonies: Welcome and Review of Conference Organization
8:45 – 9:30Keynote - Bradley Nix
US National Cybersecurity and Communications Integration Center (NCCIC)
9:45 – 10:45
Michael Wylie
Richey Richey May Technology Solutions

The Costly Mistakes of Being Unprepared
Jamie Rees
NB Power

Cybersecurity apprenticeship - tackling the talent gap
Wilco Van Ginkel
a3i

Trust or not to trust in AI - that's the question!
10:45 – 11:00Morning Break / Vendor Booths / Networking
11:00 – 12:00
Rob Samuel
Province of Nova Scotia

From Boardroom to War Room: Practical Application of the NIST Cybersecurity Framework
Bryan Ward
Ilumio

Stop Cyber Threats with Adaptive Micro-Segmentation

Andrew Kozma
Halifax Regional Police Department

From Assessor/Auditor to Executive -or- Aligning your security program to meet organizational objectives

12:00 - 1:00Lunch

Presentation
- Closing the IoT, Wireless Security Gap. Security in a world of connected things, Michael Deschenes, Bulletproof
1:00 - 2:00
Patrick McBride
Claroty

The Perfect Storm Driving Industrial Cybersecurity
Victoria McIntosh
Information in Bloom

Mirror, Mirror, on the Wall, Is Facial Recognition the Right Authenticator for All?
Darryl MacLeod
Securicy

The Security Questionnaire: To Do or Not To Do
2:00 - 2:30Afternoon Break / Vendor Booths / Networking
2:30 - 3:30
Roger G. Johnston
Right Brain Sekurity

How to Have Lousy Security: A Vulnerability Assessor’s
Perspective
Shira Shamban & Grant Asplund
Dome9

Gone in 127 Minutes - Why Ephemeral Infrastructures Need Native Visibility, Security and Compliance
Trevor Flynn,
Bulletproof

Leveraging Intelligent Cloud Security for Great User Experiences
3:45 - 4:45
Justin Gratto
Secure State Cyber

Boots to Bytes – Transitioning from Military to a Civilian in the Cyber Security Industry
Sean Keef
Skybox

Analytics-Driven Automation for Better Attack Surface Management
David Shipley
Beauceron Security

A New Framework and Approach for Cybersecurity Awareness
5:30 - 7:00Social Event
Day 2 - Tuesday, Oct. 30, 2018
7:45Onsite Registration and Coffee / Exhibit Area Open
8:30 – 8:45Master of Ceremonies: Welcome and Review of Conference Organization
8:45 – 9:30Keynote - Lisa Bradley
NVIDIA - Product Security Incident Response Team (PSIRT)
9:45 – 10:45
Alina Matyukhina
Canadian Institute for Cybersecurity

Anonymity and security in blockchain
Tarek Habib
KPMG

A practical approach to business resilience: crisis management, business continuity and disaster recovery
Sunny Jamwal
MNP

Subsistence* Living using PowerShell and WMI
10:45 – 11:00Morning Break / Vendor Booths / Networking
11:00 - 12:00
Garry Coldwells
Palo Alto Networks

The imperative for auditing of admin rights and storage in cloud deployments
Michael Wylie
Richey Richey May Technology Solutions

Cloud Security on the Dollar Menu
Greg Young
Trend Micro

A Crash Course in Getting Security Right in 2019
12:00 - 1:00Lunch

Presentation
- CLX Forum- A Community Built on Crowdsourced Peer-vetted Cyber Content, Ajay Sood
1:00 - 2:00
Lilly Chalupowski
GoSecure

Don’t RAT me Out
Erik Denis
UNB

Early stages of a cybersecurity awareness program: How UNB is addressing the urgent need for better cybersecurity awareness throughout the organization
Patrick Potter
RSA

EMBRACE Risk in your Digital Transformation Journey
2:00 - 2:30Afternoon Break / Vendor Booths / Networking
2:30 - 3:30
Elaheh Samani
Google

Understanding the Security of Chrome Extensions
Anthony English
Mariner Security Solutions

Third Party Due Diligence
Keith Rayle
Fortinet

Swarm vs. Hive – The Cyberwarfare Landscape of Today
3:45 - 4:45
Jason Dookwah
Symantec

Living off the land tactics, fileless attacks & dual-use tools
Samuel Kiragu
Nova Scotia Community College

Keeping regulators awake! Cybercrime and other related crimes;
Regulatory Compliance around the world
James Murray
Controls Inc.

Where in the ____ are my Audit Reports?!
4:45 - 5:00Master of Ceremonies - Event Closure
Training Day - Wednesday, October 31, 2018
8:00 – 8:30Onsite Registration and Coffee
8:30 – 12:00
Michael Wylie
Corporate Blue

Using Wireshark for Incident Response and Threat Hunting
Peter Morin
KPMG
Human Security – Understanding Behavior and Building Successful Programs to Protect Your Organization.
Sandy Fadale
Governance leading practices – How to setup governance in your organization
12:00 - 1:00Lunch
1:00 - 4:30
Michael Wylie
Corporate Blue

Using Wireshark for Incident Response and Threat Hunting
Peter Morin
KPMG
Human Security – Understanding Behavior and Building Successful Programs to Protect Your Organization.
Sandy Fadale
Governance leading practices – How to setup governance in your organization