General Information
Trust, Transparency & Transformation: Governing Artificial Intelligence
As the world enters the fifth industrial age, transforming the public sector has become an urgent priority. This shift necessitates innovative strategies to ensure that public servants are aptly trained in privacy and security issues. This adaptation is critical as we continue to accelerate our move to digital platforms, where safeguarding personal data is paramount.
The 28th Annual Victoria International Privacy & Security Summit, hosted at the Victoria Conference Centre, is poised to be a cornerstone event in this transformation. This fully in-person summit will welcome up to 1,000 professionals involved in public sector transformation, security, and privacy, offering them a unique opportunity to discuss how we securely live, work, and play in the digital era.
This year’s summit will highlight, “Trust, Transparency & Transformation: Governing Artificial Intelligence,” and will spearhead the intellectual odyssey. This summit brings together visionaries, experts, and innovators to explore the intricate intersection of advanced artificial intelligence with critical privacy and security imperatives.
Keynote sessions, interactive workshops, and collaborative panels will unravel the complex challenges and opportunities ushered in by our digital age. Participants will gain insights into creating strategies that seamlessly integrate AI advancements with an unwavering commitment to individual rights, data sovereignty, and technological trust.
Training public servants on issues of privacy and security is emphasized throughout the summit. The event aims to provide attendees with practical strategies to protect data effectively, ensuring that as digital platforms proliferate, the public sector continues to uphold trust and integrity.
Join us in charting a course towards a harmonious future, where the transformative potential of AI aligns with our steadfast commitments to privacy and security.
CPD/CPE Credits
We are proud to announce that delegates within local government and professionals in the industry can obtain CPD/CPE credits through The BC Law Society and various other organizations.
We acknowledge that gaining approval to attend training conferences can be challenging. As support in your continued privacy and security education, please click here for a sample Justification letter you can customize to build your case in attending. Once you click on the link, select “File” in the upper left corner, and download to edit.
Registration Information
Early Bird Rates (until December 31st)
| Public Sector | Private Sector | |
| VIPSS 3-Day Pass (Victoria Conference Centre) |
$495.00CAD (plus GST) | $795.00 CAD (plus GST) |
Standard Rates (starting January 1st)
| Public Sector | Private Sector | |
| VIPSS 3-Day Pass (Victoria Conference Centre) |
$650.00 CAD (plus GST) | $995.00 CAD (plus GST) |
If you are a post-secondary student please inquire about our special student rate. If you have a group of 10+ individuals looking to attend please reach out regarding group discounts.
Please note we have 25 complimentary student tickets available sponsored by BC Freedom of Information and Privacy Association so please contact us if you would like one!
Registration Includes*:
- Join us live in Victoria, B.C for our 3-day summit (March 3-5, 2026) – includes the pre-summit educational workshop day on March 3rd (no lunch served this day).
- Collaborate with senior executives who are changing the privacy & security industry
- Signature keynotes and concurrent keynotes by international subject matter experts in privacy & security
- Concurrent panel sessions + interactive in-person Q & A
- Unparalleled in-person networking via 1:1 meetings and small group conversations
- Exhibit booths for our top tier sponsors
- Lunch (March 4th & 5th) and coffee breaks (March 3-5)
*Subject to provincial guidelines (masks are currently optional).
Social Media
Stay connected and engaged in the conversation leading up to and during the summit by following along on X (Twitter) @VIPSSummit. Use the event hashtag #VIPSS and #VIPSS26 in your tweets to add to the existing discussions. We would appreciate you sharing your voice with our other followers.
Please join us on Bluesky and follow our new account for Reboot Communications
Victoria Conference Centre
There’s nowhere in the world like Victoria. It’s small yet sophisticated; a technology leader and an historic capital city; a vibrant business community yet surrounded by nature. At its heart is the Victoria Conference Centre – an exceptional experience for delegates and world-class support for planners.
Victoria Conference Centre
720 Douglas Street
Victoria, BC
V8W 3M7
*Invited Speaker
Click on the date of the agenda you would like to view. Please note the timezone listed on the agenda.
Tuesday, March 3, 2026
9:00 - 10:30am PST • Theatre
Session 1A - Concurrent Workshop by Cisco: Prescriptive Based Response is Kryptonite to Adversaries
This immersive, hands-on lab experience will focus on developing key skills for investigating and responding to cyber incidents. Participants will learn practical techniques for identifying, analyzing, and responding to sophisticated advanced persistent threats (APTs) using Extended Detection & Response (XDR). The strategies and skills gained will be broadly applicable across a range of tools and environments. Learn how to empower your teams to go from endless investigation to remediating the highest priority incidents with greater speed, efficiency, and confidence. The session will be 80min lecture and then 10min to ensure everyone has access to the labs. The labs will be available to all attendees for up to 7 days. If you complete the labs, you will also get CPE credits. Please ensure you bring your laptops.
9:00 - 10:30am PST • Oak Bay Room
Session 1B - Concurrent Workshop by OIPC BC: Surveillance in the Public and Private Sector
In this 3-part workshop facilitated by staff of the Office of the Information and Privacy Commissioner for BC, the workshop facilitators will first walk participants through the basics of how BC’s Freedom of Information and Protection of Privacy Act and Personal Information Protection Act apply to surveillance projects. In the second part, participants will break into small groups to discuss potential ideas for surveillance projects, and how FIPPA or PIPA might apply. Then, for the last part, the session leads will bring the group back together for a dialogue where participants can share what they learned, ask questions, and offer suggestions for future tools and guidance from the OIPC.
9:00 - 10:30am PST • Saanich Room
Session 1C - Concurrent Workshop by Ministry of Citizens' Services
10:30 - 10:45am PST • First Floor Foyer
Morning Coffee Break
10:45am - 12:15pm PST • Oak Bay Room
Session 2B - Concurrent Workshop: Where Security Meets Story
In an environment where privacy and security decisions carry real business, legal, and human impact, how those decisions are communicated matters as much as the controls themselves. Security and privacy leaders must move beyond metrics and technical language to tell stories that create understanding, trust, and action.
Where Security Meets Story is a highly interactive 90-minute workshop that helps security and privacy professionals translate complex risk, privacy, and security concepts into clear, compelling narratives that resonate with executives, boards, regulators, and non-technical stakeholders.
Drawing on over 40 years of real-world leadership experience, Tim McCreight explores how storytelling becomes a strategic capability enabling practitioners to connect business context, risk, and impact in ways that support better decisions. Participants will apply practical storytelling techniques through guided exercises they can immediately use in briefings, incident communications, and strategic discussions.
This session equips attendees with tools to make security and privacy messages stick - where clarity leads to alignment, and alignment leads to action.
10:45am - 12:15pm PST • Saanich Room
Session 2C - Concurrent Workshop: Empower Your Practice Through Ethics Training
The goal of this 90-minute workshop is to empower participants to confidently manage risks associated with transformation and innovation through ethics training. The workshop will begin with an overview of fundamental ethics tools and concepts from the field of bioethics. Participants will then have the opportunity to apply these learnings by working through a series of interesting (and sometimes contentious), real-life case studies.
10:45am - 12:15pm PST • Esquimalt Room
Session 2D - Concurrent Workshop: AI Browsers (LLM Browsers) and Their Security/Privacy Risks
12:15 - 1:30pm PST •
Lunch Break (Delegates on their own for lunch)
1:30 - 3:00pm PST • Theatre
Session 3A - Concurrent Workshop by Sponsor (TBD)
1:30 - 3:00pm PST • Oak Bay Room
Session 3B - Concurrent Workshop: Intersection of PETs and Emerging Policies and Legal Frameworks
1:30 - 3:00pm PST • Esquimalt Room
Session 3D - Concurrent Workshop by the Canadian Centre for Cyber Security
1:30 - 4:45pm PST • Sidney Room
Session 3E - Concurrent Workshop: Practical De-identification Methods - Part 1 (3 hour session)
Access to and sharing of data provides great benefits - it is the foundation for research, innovation, and progress - but it also brings concerns about privacy. Preserving the privacy of personal information is an ethical and regulatory responsibility when using and sharing data. Understanding the concepts of privacy disclosure and translating them into practical methodology is crucial when using or disclosing personal data in real world situations. This workshop on de-identification methods will guide you through the concepts and methods used in a risk-based de-identification approach.
Learning Objectives:
-Gain a broad understanding of the considerations around managing disclosure risks in data
-Learn practical methods for evaluating and managing disclosure risks
-Understand what are good practices for de-identification and for managing disclosure risks more generally
-Understand how to explain and justify practices for evaluating and managing disclosure risks.
3:00 - 3:15pm PST • First Floor Foyer
Afternoon Refreshment Break
3:15 - 4:45pm PST • Theatre
Session 4A - Concurrent Workshop by Sponsor (TBD)
3:15 - 4:45pm PST • Saanich Room
Session 4C - Concurrent Workshop by OIPC BC: OIPC Proceedings: Processes, Tips, and Tricks
Join Tara Laughlin (Investigator) and Alexander Lonergan (Adjudicator) of the Office of the Information and Privacy Commissioner for British Columbia as they discuss the types of administrative proceedings that come before the Commissioner’s office. This session will include an overview of the Office’s processes from intake to inquiry, as well as a closer look at the most common requests and interlocutory applications that parties make.
1:30 - 4:45pm PST • Sidney Room
Session 4E - Concurrent Workshop: Practical De-identification Methods - Part 2 (3 hour session)
Access to and sharing of data provides great benefits - it is the foundation for research, innovation, and progress - but it also brings concerns about privacy. Preserving the privacy of personal information is an ethical and regulatory responsibility when using and sharing data. Understanding the concepts of privacy disclosure and translating them into practical methodology is crucial when using or disclosing personal data in real world situations. This workshop on de-identification methods will guide you through the concepts and methods used in a risk-based de-identification approach.
Learning Objectives:
-Gain a broad understanding of the considerations around managing disclosure risks in data
-Learn practical methods for evaluating and managing disclosure risks
-Understand what are good practices for de-identification and for managing disclosure risks more generally
-Understand how to explain and justify practices for evaluating and managing disclosure risks.
Wednesday, March 4, 2026
8:25 – 8:40am PST • Salon ABC
Opening Remarks
10:20 – 10:45am PST • Upper & Lower Foyers
Morning Coffee Break
10:45 – 11:45am PST • Salon B
Session 3B - Concurrent Panel: Regulatory Design of AI Governance in Healthcare
10:45 – 11:45am PST • Theatre
Session 3C - Concurrent Panel: CSIS @ Day One - Reflections on the Past; Perspectives on the Future
11:50am – 12:20pm PST • Salon A
Session 4A - Concurrent Keynote by KPMG/Icon Law
11:50am – 12:20pm PST • Salon B
Session 4B - Concurrent Keynote by Jody Thomas
11:50am – 12:20pm PST • Theatre
Session 4C - Concurrent Keynote by Optiv/Palo Alto
12:20 – 1:35pm PST • Salon ABC
Lunch Break
1:35 – 2:05pm PST • Salon A
Session 5A - Concurrent Keynote: Global Game, Global Target: Understanding and Defending against the Hybrid Threat Landscape of FIFA 2026
While events like FIFA and the Olympics bring together our global community in a celebration of sport and national pride, they also attract threat actors who target every aspect of the games. FIFA 2026 will be the first games to host forty-eight national teams across three countries and have the additional challenge of defending against an unprecedented hybrid landscape. This session will explore layered security considerations and how to coordinate our efforts to combat evolving threats.
1:35 – 2:05pm PST • Salon B
Session 5B - Concurrent Keynote by Okta
1:35 – 2:05pm PST • Theatre
Session 5C - Concurrent Keynote by Check Point: The Executive Playbook for Secure and Responsible AI
As AI becomes embedded in public-sector operations, it introduces new leadership, regulatory, and cybersecurity risks. AI is no longer just a technology initiative. It is a governed, regulated, and mission-critical asset.
This session reframes AI governance as an executive responsibility, examining how frameworks such as Canada’s Artificial Intelligence and Data Act (AIDA), privacy obligations, and cybersecurity requirements intersect with the need to secure AI systems against manipulation, data poisoning, and misuse. This session offers a clear executive lens on governing and securing AI to enable innovation while protecting public trust.
2:10 – 2:40pm PST • Salon A
Session 6A - Concurrent Applied Session by Varonis
2:10 – 2:40pm PST • Salon B
Session 6B - Concurrent Applied Session by iON/Tenable
2:10 – 2:40pm PST • Salon C
Session 6C - Concurrent Applied Session by the Canadian Centre for Cyber Security
2:10 – 2:40pm PST • Theatre
Session 6D - Concurrent Applied Session by Cloudflare
2:10 – 2:40pm PST • Esquimalt Room
Session 6G - Concurrent Applied Session: Shadow AI - The Invisible Threat from your Most Productive Employees
This session examines how organisations can change from sanctions to sandboxes—providing secure, governed AI alternatives that meet productivity needs while addressing the socio-technical challenge through technical detection, organisational governance frameworks, board-level accountability, and zero-trust architectures. Drawing on multiple case studies, John Wunderlich provides you with actionable strategies for transforming Shadow AI from a liability into a governed capability.
2:40 – 3:05pm PST • Upper & Lower Foyers
Afternoon Refreshment Break
3:05 – 4:05pm PST • Salon A
Session 7A - Concurrent Panel: AI-powered Cyberattacks: Foreign Threats Driven by Geopolitical Conflict
3:05 – 4:05pm PST • Salon B
Session 7B - Concurrent Panel: Children’s Privacy and Safety Regulation Policy: Canada’s Development of Children’s Privacy Framework
3:05 – 4:05pm PST • Theatre
Session 7D - Concurrent Panel: Agentic AI: Fostering Responsible and Beneficial Development and Adoption
The emergence of agentic AI presents unprecedented opportunities, driving opportunities for innovation, scalability, and efficiency. This panel will explore best practices for implementing practical, governance-driven approaches to deploying agentic AI while navigating emerging risks, challenges and regulatory expectations.
5:15 - 5:25pm PST • Salon ABC
Remarks by ISACA Vancouver
Thursday, March 5, 2026
9:10 – 9:50am PST • Salon ABC
Session 11 - Keynote Address by Platinum Sponsor
9:50 – 10:30am PST • Salon ABC
Session 12 - Keynote Address by Cisco: Assuming Failure Provides Better Defensive Outcomes
In this session we will explore common adversarial tactics and the defensive capabilities to minimize these risks. This capability once operationalized provides a level of comfort but we as defenders need to proactively assume it will fail. Failure allows us to determine the next phase of the attack and therefore how we must advance our next phase of defensive capabilities. This provides a methodology that drives better overall cyber resilience even when we cannot get our risk mitigating capability 100% deployed 100% of the time - reality suggests 100% is rarely achieved throughout the lifecycle of most tooling. Time to rethink the approach.
10:30 – 10:55am PST • Upper & Lower Foyers
Morning Coffee Break
10:55 – 11:55am PST • Salon B
Session 13B - Concurrent Panel: Digital Payments - Identity Management: Agentic Commerce
10:55 – 11:55am PST • Salon C
Session 13C - Concurrent Panel: Genetic Privacy - Their Data Your DNA (Investigative Genetic Genealogy)
10:55 – 11:55am PST • Theatre
Session 13D - Concurrent Panel: Quantum Computing
This engaging panel explores the transformative impact of quantum computing on privacy and security in the current era. Panelists will discuss how advancing quantum technologies can strengthen national cybersecurity defenses while driving economic growth and innovation in Canada's quantum ecosystem and examine the risks to data privacy, encryption vulnerabilities, and the urgent need for ethical, risk-based regulatory frameworks to safeguard society.
12:00 – 12:30pm PST • Salon A
Session 14A - Concurrent Keynote: Insecure Vibes: The Risks of AI-Assisted Coding
AI coding assistants like GitHub Copilot and ChatGPT are changing how developers write and ship software, faster than security teams can keep up. But speed comes at a cost: “vibe coding” encourages developers to trust confident-looking code that may be dangerously insecure.
In this talk, we’ll look at real-world examples and research showing how AI tools replicate and amplify insecure patterns, why traditional AppSec controls often fail to catch these issues in time, and how teams can adapt. We’ll explore modern strategies to make AI-assisted coding safer without making it slow (secure RAG references, MCP enforcement layers in the IDE, guardrails, policy integration, and developer education).
Whether you’re on the AppSec side or writing code, this session will equip you with a clearer threat model and practical tools to secure your AI-augmented SDLC.
12:00 – 12:30pm PST • Salon B
Session 14B - Concurrent Keynote
12:00 – 12:30pm PST • Theatre
Session 14C - Concurrent Keynote
12:30 – 1:45pm PST • Salon ABC
Lunch Break
1:45 – 2:45pm PST • Salon A
Session 15A - Concurrent Panel: CISO Panel - Major Challenges and Opportunities in the New World of AI
1:45 – 2:45pm PST • Salon B
Session 15B - Concurrent Panel: Data Security in the Age of Artificial Intelligence: Best Practices on Bringing AI Into Your Organization
1:45 – 2:45pm PST • Theatre
Session 15D - Concurrent Panel: Canada’s Approach to Digital Regulation: Advancing a Digital North Star for Canada Amid a Fractured Firmament
Data policy—and consequently, the work of data governance professionals—is increasingly tied to broader currents in geopolitics. As Canada moves forward with potential PIPEDA reforms and other digital regulation strategies, what trends on a global scale should not be overlooked and how should they inform policymaking in Ottawa and beyond?
2:45 – 3:15pm PST • Upper & Lower Foyers
Afternoon Refreshment Break
3:15 – 3:45pm PST • Various Rooms
Session 16 - Concurrent Applied Sessions
The 28th Annual Victoria International Privacy & Security Summit is proudly sponsored by the following companies.
If you would like to sponsor this event, please download the Sponsorship Brochure for more information.
Title Sponsor
Platinum Sponsors
Gold Sponsors
Silver Sponsors
Summit Sponsors
Hotel Room Block
Fairmont Empress Hotel Room Block
If you need to make accommodation arrangements, the Fairmont Empress is offering a special conference rate of $249/night for Corporate and Government reservations. Please note that this room block ends February 11, 2026.
Please contact the hotel directly at (250) 384-8111 or 1 (800) 230-6922 to book a room or book online using the following link. If booking by phone please indicate you are with the “28th Annual Victoria International Privacy & Security Summit” group.
Please note that once the above room block is full we do also have a special rate of $259/night still being offered if rooms are available in the hotel’s general inventory – to book at this rate please click here.
Fairmont Empress
721 Government Street
Victoria, BC
V8W 1W5






















































































