19th Annual Privacy and Security Conference Security & Privacy: A Global Evolution Feb. 7-9, 2018, Victoria, BC

General Information

Held in Victoria, British Columbia, Canada this conference is a must attend for those working in the privacy and security fields. Presented by the Office of the CIO, Ministry of Citizens’ Services, Province of British Columbia, this three-day conference, is recognized as one of the top tier events in North America. Anyone working in the information privacy and security fields will benefit from the speakers, discussions and networking at the conference. Attendees are from every level both within government and private industry. The conference draws an international audience of some 1,000 delegates with an interest in cutting edge policy, programs, law, research and technologies aimed at the protection of privacy and security.

It is with great admiration that we dedicate the 19th Annual Privacy & Security Conference to Joseph Alhadeff’s memory.  Joseph Alhadeff, a wonderful man and brilliant privacy expert who worked for Oracle, passed away in May 2017 at the age of 57.  Many of you will remember Joe as he has graced the stages of the Privacy & Security Conference for almost all of its past 18 years.  We invite you to celebrate his life with us during the conference. Join subject matter experts and close friends of Joe’s at the panel session “What Would Joe Do?” as they reminisce about his career and discuss his outlooks on today’s pressing privacy and security issues.

Reasons to Attend

  • Get face-to-face dialogue with international industry experts who have successfully implemented best practices solutions
  • Learn about current trends, issues and actions
  • Obtain your annual Continuing Professional Development credits
  • Discover new methods and products that can lower expenses and increase revenues
  • Take the pulse of what is happening for tools, technologies, and processes
  • Get Immediate answers and solutions to issues current in your organization

Conference Rates*

Early Bird registration
by December 15, 2017
Regular registration
after December 15, 2017
Public Sector $675.00 CAD
(plus GST)
$795.00 CAD
(plus GST)
Private Sector $795.00 CAD
(plus GST)
$950.00 CAD
(plus GST)

*We are pleased to offer our Alumni program, providing a special rate to past attendees.  Delegates who have attended this conference before will receive the special price of $595 when they register on or before September 29th.  Please contact us for the promo code if you did not receive it by email.

Registration Fees Include

  • 2 plated lunches
  • All coffee breaks
  • All keynotes, plenaries, panel sessions and applied sessions
  • Pre-conference educational sessions
  • Access to networking lounges
  • Networking reception Thursday evening
  • Conference notebook
  • Conference materials
  • On-line access to presentations post-event

Victoria Conference Centre

There’s nowhere in the world like Victoria. It’s small yet sophisticated; a technology leader and an historic capital city; a vibrant business community yet surrounded by nature. At its heart is the Victoria Conference Centre – an exceptional experience for delegates and world-class support for planners.

Victoria Conference Centre
720 Douglas Street,
Victoria, BC
V8W 3M7

Keynote Speakers

Ray Boisvert

Provincial Security Advisor, Government of Ontario

Marc Rotenberg

President, Electronic Privacy Information Center (EPIC)

John Scott

CEO, 2Keys Corporation

Speakers

Ian Bailey

Acting Government Chief Information Officer, Ministry of Citizens’ Services, Province of BC

Ray Boisvert

Provincial Security Advisor, Government of Ontario

Dan Caprio

Senior Strategic Advisor and Independent Consultant, McKenna Long & Aldridge LLP

Dr. Khaled El Emam

CEO and Founder, Privacy Analytics

Tim Fitzgerald

Chief Information Security Officer, Arm

Joanna Fletcher

Blockchain Evangelist

Robin Gould-Soil

Chief Privacy Officer, HSBC Canada

Sorana Ionescu

Director, Smart Metering, IESO

John Jordan

Executive Director, Services Strategy, Province of BC

Handol Kim

General Manager, Quadrant Business Unit, D-Wave Systems

Kevin Kim

Privacy Manager, First Nations Health Authority

Dr. Victoria Lemieux

Associate Professor, University of British Columbia

Kevin Lo

Managing Director, Froese Forensic Partners

David Loukidelis

Associate Counsel, Young Anderson; former BC Information and Privacy Commissioner

Drew McArthur

Acting Information and Privacy Commissioner for British Columbia

Dr. Kimberlyn McGrail

Scientific Director, Population Data BC; Associate Professor, UBC School of Population and Public Health

Samson Mow

CEO, Pixelmatic; CSO, Blockstream

Richard Purcell

CEO, Corporate Privacy Group

Adrian Sakundiak

Program Manager, Alberta Health Services

Anna Slomovic

Former Chief Privacy Officer, Equifax; Lead Research Scientist, Cyber Security Policy & Research Institute, George Washington University

Dominic Vogel

Chief Security Strategist, Cyber.SC
Print Agenda

*Invited Speaker

Wednesday, February 7, 2018

8:30am-12:00pm Oak Bay Room

BC Ministry of Citizens’ Services – Information Security Branch presents: Breach the CyberWall and Win 1st Prize

Be part of the second CyberWall Competition at Victoria’s 2018 Privacy and Security Conference. Expect a fun, challenging, educational and team-building event, designed for people with minimal or entry-level hacking skills.

Teams of 4 will work together to break through cyber defenses, disrupt a virtual company and capture the secrets. Be part of the winning team and take home the coveted 1st prize. Tom Levasseur, veteran cyber breach event organizer and owner of Hackingaway.org, leads each team through the event ensuring an organized, productive and learning experience.

This morning session is less technical, so suitable for people with only basic IT skills. The session lasts 3.5 hours and does not require any previous hacking knowledge! The competition is not an event for people with advanced hacking skills.

Participants play the role of the cyber criminals trying to break into the target organization's IT infrastructure. The target is composed of firewalls, routers, servers and desktops in a complex and realistic but safe environment. By working in teams everyone contributes the skills they have - and learns from each other.

Teams work together to be the first to break through to each stage, gather points, and win the challenge. Then wrap up with time to understand, and learning to defend.

First come first serve, plan to register quickly following registration opening on January 22nd (all registered conference delegates will receive an email on this date with registration instructions). A waiting list will be created in case of over registration.

Participants must bring their own laptop; laptops will not be provided. Participants will be using RDP (Remote Desktop Protocol) software for this event. RDP software is included in all recent versions of MS-Windows, and available for free download from Mac App Store. Participants will connect using a network wire. Your laptop must have a RJ45 connector or a USB-to-Ethernet 10/100 connector.

Upon attending this workshop, participants will be able to:
• Understand how hackers use tools and techniques to exploit vulnerabilities in computer systems;
• Where authorized, use specific tools and techniques to test system security in their organizations;
• Understand how to better protect systems from attack;
• Call on others from the event for advice and help.

9:00am-12:00pm Esquimalt Room

BC Ministry of Citizens’ Services – Information Security Branch presents: Encryption & Blockchain

9:00am-12:00pm Sidney Room

Ethics Session

1:00pm - 4:00pm TBD

Privacy Analytics presents:

1:00pm - 4:30pm Oak Bay Room

BC Ministry of Citizens’ Services – Information Security Branch presents: Breach the CyberWall and Win 1st Prize

Be part of the second CyberWall Competition at Victoria’s 2018 Privacy and Security Conference. Expect a fun, challenging, educational and team-building event, designed for people with minimal or entry-level hacking skills.

Teams of 4 will work together to break through cyber defenses, disrupt a virtual company and capture the secrets. Be part of the winning team and take home the coveted 1st prize. Tom Levasseur, veteran cyber breach event organizer and owner of Hackingaway.org, leads each team through the event ensuring an organized, productive and learning experience.

This afternoon session is for new and returning participants, and requires a few more advanced technical skills. However, the competition is not an event for people who already have advanced hacking skills.

Participants play the role of the cyber criminals trying to break into the target organization's IT infrastructure. The target is composed of firewalls, routers, servers and desktops in a complex and realistic but safe environment. By working in teams everyone contributes the skills they have - and learns from each other.

Teams work together to be the first to break through to each stage, gather points, and win the challenge. Then wrap up with time to understand, and learning to defend.

First come first serve, plan to register quickly following registration opening on January 22nd (all registered conference delegates will receive an email on this date with registration instructions). A waiting list will be created in case of over registration.

Participants must bring their own laptop; laptops will not be provided. Participants will be using RDP (Remote Desktop Protocol) software for this event. RDP software is included in all recent versions of MS-Windows, and available for free download from Mac App Store. Participants will connect using a network wire. Your laptop must have a RJ45 connector or a USB-to-Ethernet 10/100 connector.

Upon attending this workshop, participants will be able to:
• Understand how hackers use tools and techniques to exploit vulnerabilities in computer systems;
• Where authorized, use specific tools and techniques to test system security in their organizations;
• Understand how to better protect systems from attack;
• Call on others from the event for advice and help.

1:00pm - 4:00pm TBD

BC Ministry of Citizens’ Services – Information Security Branch presents: Defensible Security: How the 80/20 can Improve Your Posture

Cybersecurity has never been as imperative as it is today. Most organizations have failed to invest at a rate that has sustained previously achieved capability levels. Others have never reached a level of security maturity adequate to mitigate risks to an acceptable level.

This non-technical workshop will assist attendees in understanding the Defensible Security framework as designed by the OCIO, and provide practical ways of achieving a hygiene level security posture in the most efficient way possible.

All attendees will be provided access to Defensible Security tools and templates. Printouts will be provided at the workshop, however exercises can be completed digitally if participants bring their own laptop with Microsoft Office and wireless capability; laptops will not be provided.

Recommended attendees: Information Officers, Information Security Officers, Risk Officers, Security Analysts, Security Architects, Security Consultants, Security Engineers, Security Administrators

Upon attending this workshop, participants will be able to:
• Understand how to leverage defensible security within their organization
• Gain a clear understanding of the Defensible Security framework
• Understand the control objectives for the control elements
• Understand how to utilize the tools and templates

1:00pm - 4:00pm Colwood Room

BC Ministry of Citizens’ Services – Corporate Information Records Management Office presents:

Thursday, February 8, 2018

7:30am

Registration & Networking Lounge Open

8:15am - 8:20am Carson Hall (Salon ABC)

Call to Conference - Master of Ceremonies

8:20am - 8:30am Carson Hall (Salon ABC)

Welcome Remarks

8:30am - 9:05am Carson Hall (Salon ABC)

Keynote Presentation

9:05am - 9:45am Carson Hall (Salon ABC)

Keynote Presentation

9:45am - 10:00am Upper & Lower Foyers

Morning Break - Sponsored by Nymity

10:00am - 10:30am Salon A

Concurrent Keynote Presentation by F5 Networks

10:00am - 10:30am Salon B

Concurrent Keynote Presentation by TBD

10:00am - 10:30am Theatre

Concurrent Keynote Presentation by Cisco

10:35am - 11:50am Salon A

Concurrent Panel Session - Panel A: Blockchain

Government organizations across the globe are exploring the use of blockchain technology to improve operations. The ability to record transactions on distributed ledgers offers new approaches for governments to improve transparency, prevent fraud and establish trust.
According to a recent survey conducted by IBM and the Economic Intelligence Unit, government interest in blockchain is high:
• 9 in 10 government organizations plan to invest in blockchain for use in financial transaction management, asset management, contract management and regulatory compliance by 2018
• 7 in 10 government executives predict blockchain will significantly disrupt the area of contract management
• 14 percent of government organizations expect to have blockchains in production and at scale in 2017
We take a look at how governments around the world are taking the first steps in adopting distributed ledger technology with various blockchain initiatives and pilot projects.

10:35am - 11:50am Salon B

Concurrent Panel Session - Panel B: Shedding Light on the Dark Web

The dark web is the world-wide web content that exists on dark nets, overlay networks which use the internet but require specific software, configurations or authorization to access. The dark web is used for illegal activities such as illegal trade, forums and media exchanges for pedophiles and terrorists. Botnets are often structured with their command and control services based on a censorship-resistant hidden service. Hackers sell their services for financial institutions, banks, governments and private organizations. Although much of the dark web is innocuous prosecutors and government agencies among others are convinced that it is a haven for criminal activities and social injustices.

10:35am - 11:50am Theatre

Concurrent Panel Session - Panel C: Data Breaches - Another Day Another Breach

10:35am - 11:50am Salon C

Concurrent Panel Session - Security Technical Panel: Mobile Security and Privacy: Promoting Consumer Privacy and Security in the Mobile Ecosystem

The growth of the mobile internet, led by the success of smartphones and mobile broadband technology continues to bring widespread benefits and opportunities to people around the world. It also creates new challenges regarding the security and privacy of mobile user’s personal information.

One of the major challenges faced by the growth of the mobile internet is that the security and privacy of consumers’ personal information is regulated by a patchwork of geographically bound privacy regulations, while the mobile internet is international.

Governments should ensure legislation it technology neutral and that its rules are applied consistently to all players in the internet ecosystem.

The mobile industry should ensure privacy risks are considered when designing new apps and services.

How do stakeholders from across the mobile industry work to develop a consistent approach to privacy protection while promoting trust in mobile services.

11:50am - 1:05pm Carson Hall (Salon ABC)

Luncheon Keynote Presentation

11:50am - 1:05pm Crystal Ballroom

Networking Luncheon

1:05pm - 1:40pm Carson Hall (Salon ABC)

Keynote Presentation by IBM

1:50pm - 2:20pm Salon A

Applied Session

1:50pm - 2:20pm Salon B

Applied Session by F5 Networks

1:50pm - 2:20pm Salon C

Applied Session by Cisco

1:50pm - 2:20pm Theatre

Applied Session - New Age Enterprise Security Playbook: First 100 Days

Cyber security is not rocket science. In this applied session, learn about developing an effective and efficient enterprise security program that starts with strong culture and risk communication. If you recently became a CISO or security director you will learn how to build your playbook for your first 100 days on the job. Ditch the dated old school security ways and embrace a more modern approach. The pillars of building the new age enterprise security are: developing a positive security culture, making secure business processes easy, reducing alert overload, fostering enduring business relationships, constant communication with executives, and getting the biggest bang for your limited bucks with risk prioritization.

1:50pm - 2:20pm Saanich Room

Applied Session

1:50pm - 2:20pm Oak Bay I Room

Applied Session

Applied Session - Ransomware LIVE Demo

Ransomware has become widespread in the past few years. As defenders we need to understand it. In this fast-paced and practical session you'll see exactly how the most widespread ransomware attack of 2017 was built, and then witness a LIVE demonstration (not a video or a simulation) of the attack in action. You will fully understand the ramifications of such a campaign. A brief discussion will follow to highlight what we've learned, and why this attack was so successful. You're gonna' wanna' cry.

1:50pm - 2:20pm Sidney

Applied Session

2:20pm - 2:40pm Upper & Lower Foyers

Afternoon Break

2:40pm - 3:55pm Salon A

Concurrent Panel Session - Panel A: Smart Machines, Deep Learning & Big Data

What is Deep Learning - a form of machine learning that uses a computing model inspired by the structure of the brain which requires less human supervision. “a technology that makes many applications smarter and more natural through experience.

How is it done- The brains of artificial intelligence through deep learning algorithms (neural networks), open source technology, large data sets, engineering experts and specialized hardware.

How can it be used- Understanding speech personal assistance, control a robot, aid vision for self-driving cars, image recognition, identifying patterns, fraud detection, predict behaviours and advertising.

2:40pm - 3:55pm Salon B

Concurrent Panel Session - Panel B: Internet of Things: Shedding Light on Smart City Privacy & Surveillance

Cities and communities generate data through a vast and growing network of connected technologies that power new and innovative services ranging from apps that can help drivers find parking spots to sensors that can improve water quality. Such services improve individual lives and make cities more efficient. While smart city technologies can raise privacy issues, sophisticated data privacy programs can mitigate these concerns while preserving the benefits of cities that are cleaner, faster, safer, more efficient, and more sustainable.

2:40pm - 3:55pm Theatre

Concurrent Panel Session - Panel C: GDPR: Canadian Privacy Law No Longer Adequate for Europeans

2:40pm - 3:55pm Salon C

Concurrent Panel Session - Privacy Technical Panel: Data Classification

4:05pm - 5:05pm Carson Hall (Salon ABC)

Dedication to the Life and Work of Joe Alhadeff - Panel: What Would Joe Do?

Joseph Alhadeff, a wonderful man and brilliant privacy expert, passed away in May 2017 at the age of 57. Many of you will remember Joe as he has graced the stages of the Privacy & Security Conference for almost all of its past 18 years. Most recently VP for Global Public Policy and Chief Privacy Officer for Oracle, Joe was a sought after speaker around the world and we were privileged to have him return to our conference year after year and, most importantly, to call him a good friend.

It is with great admiration that we dedicate the 19th Annual Privacy & Security Conference to Joe's memory. We invite you to celebrate his life with us during the conference. Join subject matter experts and close friends of Joe's during this panel session as they reminisce about his career and discuss his outlooks on today's pressing privacy and security issues.

5:05pm - 5:15pm Carson Hall (Salon ABC)

Day 1 Closing Remarks

5:15pm - 6:00pm Upper Foyer

Networking Reception

Friday, February 9, 2018

7:30am

Registration & Networking Lounge Open

8:20am - 8:25am Carson Hall (Salon ABC)

Administrative Announcements

8:25am - 8:45am Carson Hall (Salon ABC)

Opening Introductions

8:45am - 9:35am Carson Hall (Salon ABC)

Keynote Presentation

9:35am - 10:15am Carson Hall (Salon ABC)

Keynote Presentation

10:15am - 10:30am Upper & Lower Foyers

Morning Break

10:30am - 11:00am Salon A

Concurrent Keynote Presentation by 2Keys - Balancing Cyber Security and Digital Rights and Privacy

Effective cyber security depends on the ability to detect and resolve behaviours in advance of their impact. At the same time, legal trends such as information fiduciaries, informed consent requirements, the tort of seclusion, and digital privacy as a constitutional and property right will impact the design of systems that require digital identity and downstream data to deliver their value. If systems limit information inputs and practices to meet digital rights, is the ability to detect and protect in advance compromised?

10:30am - 11:00am Salon B

Concurrent Keynote Presentation by TBD

10:30am - 11:00am Theatre

Concurrent Keynote Presentation by TBD

11:05am - 12:15pm Salon A

Concurrent Panel Session - Panel A: Personalized Medicine & Genoimic Research

11:05am - 12:15pm Salon B

Concurrent Panel Session - Panel B: CISO Panel – Keeping your Finger on the Pulse of Security with the Lens to the Future

11:05am - 12:15pm Theatre

Concurrent Panel Session - Panel C: Artificial Intelligence: Applications, Implications and Ethics

11:05am - 12:15pm Salon C

Concurrent Panel Session - Privacy Technical Panel: De-Identification – Protecting Data Privacy and Preserving Data Utility

This panel will provide data privacy/security professionals and legal counsel with an introduction to the principles and methods of statistical disclosure limitation that can be used to de-identify healthcare data to meet the HIPAA privacy regulations while assuring that both data privacy and statistical/analytic accuracy are appropriately protected and balanced. Participants will learn the basics of statistical disclosure risk analysis (primarily for healthcare microdata): data intrusion scenarios, the importance of both sample and population uniqueness, record linkage methods, formulations of re-identification risks, k-anonymity, differential privacy and other de-identification approaches, the definition of quasi-identifiers and the significance of their classification, and the appropriate use of HIPAA limited data sets. Participants will also learn about the types of disclosure analyses, including equivalence class analyses; geography analyses; and family key analyses. After this session, participants will be able to work more successfully with statistical disclosure experts to understand and manage statistical de-identification for data sets under the HIPAA requirements while preserving analytic utility.

12:15pm - 1:30pm Carson Hall (Salon ABC)

Luncheon Keynote Presentation

12:15pm - 1:30pm Crystal Ballroom

Networking Luncheon

1:40pm - 2:10pm Salon A

Applied Session

1:40pm - 2:10pm Theatre

Applied Session

1:40pm - 2:10pm Saanich Room

Applied Session

1:40pm - 2:10pm Oak Bay I Room

Applied Session

2:10pm - 2:25pm Upper & Lower Foyers

Afternoon Break

2:25pm - 3:40pm Salon A

Concurrent Panel Session - Panel A: Genomic Research

2:25pm - 3:40pm Salon B

Concurrent Panel Session - Panel B: Biometrics: The Identity We Can’t Change

2:25pm - 3:40pm Theatre

Concurrent Panel Session - Panel C

2:25pm - 3:40pm Salon C

Concurrent Panel Session - Security Technical Panel: Cloud Security

3:50pm - 4:30pm Carson Hall (Salon ABC)

Closing Keynote Presentation

4:30pm - 4:40pm Carson Hall (Salon ABC)

Closing Remarks

4:40pm - 4:45pm Carson Hall (Salon ABC)

Closing Announcements

Platinum Sponsor

Gold Sponsors

Conference Sponsors & Exhibitors

Academic Partner

Fairmont Empress Hotel Room Block

If you need to make accommodation arrangements, the Fairmont Empress is offering a special conference rate of $169/night for Corporate reservations and $149/night for Government reservations. Please note that this room block ends January 12, 2018.

Please contact the hotel directly at (250) 384-8111 to book a room or book online using the following links:

Government Reservations – https://aws.passkey.com/go/privacyandsecurity2018
Corporate Reservations – https://aws.passkey.com/go/privacysecurityconfcorp2018

Fairmont Empress
721 Government Street
Victoria, BC
V8W 1W5

https://www.fairmont.com/empress-victoria/

YYJ Airport Shuttle Discount

If you are needing transportation from the Victoria International Airport to Downtown Victoria/Empress Hotel why not consider using the YYJ Airport Shuttle.

When booking the shuttle online or over the phone please use the promo code REBOOT20.  This will give you 20% off tickets.

For more information please visit their website at www.yyjairportshuttle.com or call them at 1-855-351-4995.

Harbour Air Seaplanes Discount

Flying in from Vancouver or Seattle for the conference? Arrive in style in Victoria’s Inner Harbour with Harbour Air.  Subject to availability, attendees will receive a 20% discount on their regular fares for confirmed travel to/from Victoria between February 5 and 11, 2018. Please note that all rates are subject to tax and fees. This offer cannot be combined with any other offers or promotions or be paid by Airbucks or TurboBucks and cannot be applied to private charters. In order to receive this special discounted rate, attendees can contact the Reservation Department directly by phone at 1.800.665.0212, by e-mail at reservation@harbourair.com or online at www.harbourair.com and quote the promotional code ‘P&SC02-18’. Also be advised that you will need to provide a copy of  your registration to the conference upon check-in.

All schedules and location information can be accessed through their website at www.harbourair.com.

Call for Speakers

  • Please note that the call for speakers closed September 29, 2017.
  • The Advisory Board for the 2018 Privacy and Security Conference is pleased to announce that the Call for Speakers is now closed.
  • Subject matter experts working within the privacy and information security communities are invited to submit papers on their area of expertise. Of particular interest are briefs on cutting-edge subjects and themes suitable for presentation in either a panel session, technical panel session or keynote address. Hosted by the Office of the Chief Information Officer, Ministry of Citizens’ Services, Government of British Columbia, this three-day conference draws an international audience focused on policy, programs, law, research and technologies aimed at the protection of privacy and security.
  • Date: February 7-9th, 2018
    Location: The Victoria Conference Centre, Victoria, British Columbia
  • 2018 Conference Suggested Topics (not exhaustive):
    • Advanced Robotics
    • Artificial Intelligence
    • Augmented & Virtual Reality
    • Autonomous Driving
    • Big Data Analytics
    • Biometrics/Geometrics
    • Blockchain
    • Cloud Computing
    • Crypto Currency
    • Cyber Security
    • Dark Web
    • Data Classification
    • Digital Privacy Rights
    • Drones
    • Ethics
    • Healthcare Privacy & Security
    • Internet of Things
    • Mobile Privacy & Security
    • Open Data
    • Ransomware
    • Smart Cities

    Deadline:

    All entries must be received by midnight of September 29th, 2017. Invited speakers will be notified by October 31st, 2017.

    Submissions:

    Submissions will be accepted electronically using the form below.

    Presentation Types:

    • Issue papers: An executive or management briefing on a prominent issue or aspect of information privacy or security.
    • Case studies: Descriptions of a specific information privacy or security situation or incident, or research results. Names of organizations can be kept anonymous to maintain confidentiality if necessary.
    • Research: Results or developments in cutting edge research on new information privacy and security technologies.
    • Sociological/ Philosophical perspective: A candid and/or introspective look at the impacts of new technological developments on privacy, security, social consciousness, or social functioning.

    Have Questions or Need More Information?